↓ Skip to main content

Information Security and Cryptology - ICISC 2015

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2015'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A General Framework for Redactable Signatures and New Constructions
  3. Altmetric Badge
    Chapter 2 On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
  4. Altmetric Badge
    Chapter 3 Attribute-Based Two-Tier Signatures: Definition and Construction
  5. Altmetric Badge
    Chapter 4 Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
  6. Altmetric Badge
    Chapter 5 Learning with Errors in the Exponent
  7. Altmetric Badge
    Chapter 6 Higher-Order Cryptanalysis of LowMC
  8. Altmetric Badge
    Chapter 7 Integral Attack Against Bit-Oriented Block Ciphers
  9. Altmetric Badge
    Chapter 8 Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512
  10. Altmetric Badge
    Chapter 9 Improved Impossible Differential Attack on Reduced-Round LBlock
  11. Altmetric Badge
    Chapter 10 Point Decomposition Problem in Binary Elliptic Curves
  12. Altmetric Badge
    Chapter 11 Faster ECC over $$\mathbb {F}_{2^{521}-1}$$ F 2 521 - 1 (feat. NEON)
  13. Altmetric Badge
    Chapter 12 On the (In)Efficiency of Non-Interactive Secure Multiparty Computation
  14. Altmetric Badge
    Chapter 13 Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks
  15. Altmetric Badge
    Chapter 14 On Differentially Private Online Collaborative Recommendation Systems
  16. Altmetric Badge
    Chapter 15 Stack Layout Randomization with Minimal Rewriting of Android Binaries
  17. Altmetric Badge
    Chapter 16 Improving Fuzzing Using Software Complexity Metrics
  18. Altmetric Badge
    Chapter 17 Uncloaking Rootkits on Mobile Devices with a Hypervisor-Based Detector
  19. Altmetric Badge
    Chapter 18 Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection
  20. Altmetric Badge
    Chapter 19 Two Lattice-Based Differential Fault Attacks Against ECDSA with w NAF Algorithm
  21. Altmetric Badge
    Chapter 20 Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules
  22. Altmetric Badge
    Chapter 21 New Efficient Padding Methods Secure Against Padding Oracle Attacks
  23. Altmetric Badge
    Chapter 22 Let Me Prove It to You: RO PUFs Are Provably Learnable
  24. Altmetric Badge
    Chapter 23 Anonymous Authentication Scheme Based on PUF
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
6 X users
wikipedia
1 Wikipedia page

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology - ICISC 2015
Published by
Springer International Publishing, March 2016
DOI 10.1007/978-3-319-30840-1
ISBNs
978-3-31-930839-5, 978-3-31-930840-1
Editors

Kwon, Soonhak, Yun, Aaram

X Demographics

X Demographics

The data shown below were collected from the profiles of 6 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 5 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 20%
Professor > Associate Professor 1 20%
Researcher 1 20%
Student > Master 1 20%
Unknown 1 20%
Readers by discipline Count As %
Computer Science 2 40%
Unknown 3 60%