↓ Skip to main content

Information Security and Cryptology – ICISC 2017

Overview of attention for book
Cover of 'Information Security and Cryptology – ICISC 2017'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 CHAM : A Family of Lightweight Block Ciphers for Resource-Constrained Devices
  3. Altmetric Badge
    Chapter 2 Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
  4. Altmetric Badge
    Chapter 3 Security of Stateful Order-Preserving Encryption
  5. Altmetric Badge
    Chapter 4 Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
  6. Altmetric Badge
    Chapter 5 Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
  7. Altmetric Badge
    Chapter 6 Improved Key Generation Algorithm for Gentry’s Fully Homomorphic Encryption Scheme
  8. Altmetric Badge
    Chapter 7 Subring Homomorphic Encryption
  9. Altmetric Badge
    Chapter 8 Novel Leakage Against Realistic Masking and Shuffling Countermeasures
  10. Altmetric Badge
    Chapter 9 Detecting Similar Code Segments Through Side Channel Leakage in Microcontrollers
  11. Altmetric Badge
    Chapter 10 Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
  12. Altmetric Badge
    Chapter 11 Recipient Revocable Broadcast Encryption Schemes Without Random Oracles
  13. Altmetric Badge
    Chapter 12 Recipient Revocable Broadcast Encryption with Dealership
  14. Altmetric Badge
    Chapter 13 Solving 114-Bit ECDLP for a Barreto-Naehrig Curve
  15. Altmetric Badge
    Chapter 14 On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus
  16. Altmetric Badge
    Chapter 15 Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems
  17. Altmetric Badge
    Chapter 16 On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices
  18. Altmetric Badge
    Chapter 17 Security Analysis of Improved Cubic UOV Signature Schemes
  19. Altmetric Badge
    Chapter 18 Evaluating the Impact of Juice Filming Charging Attack in Practical Environments
  20. Altmetric Badge
    Chapter 19 Reading Network Packets as a Natural Language for Intrusion Detection
  21. Altmetric Badge
    Chapter 20 Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Security and Cryptology – ICISC 2017
Published by
Springer International Publishing, May 2018
DOI 10.1007/978-3-319-78556-1
ISBNs
978-3-31-978555-4, 978-3-31-978556-1
Editors

Kim, Howon, Kim, Dong-Chan

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 5 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 2 40%
Professor 1 20%
Researcher 1 20%
Student > Postgraduate 1 20%
Readers by discipline Count As %
Computer Science 4 80%
Engineering 1 20%