↓ Skip to main content

Public Key Cryptography

Overview of attention for book
Cover of 'Public Key Cryptography'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol
  3. Altmetric Badge
    Chapter 2 An Efficient NICE-Schnorr-Type Signature Scheme
  4. Altmetric Badge
    Chapter 3 Identification of Bad Signatures in Batches
  5. Altmetric Badge
    Chapter 4 Some Remarks on a Fair Exchange Protocol
  6. Altmetric Badge
    Chapter 5 Gaudry’s Variant against C ab Curves
  7. Altmetric Badge
    Chapter 6 An Identification Scheme Based on Sparse Polynomials
  8. Altmetric Badge
    Chapter 7 A State-Based Model for Certificate Management Systems
  9. Altmetric Badge
    Chapter 8 Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
  10. Altmetric Badge
    Chapter 9 The Composite Discrete Logarithm and Secure Authentication
  11. Altmetric Badge
    Chapter 10 Chosen-Ciphertext Security for Any One-Way Cryptosystem
  12. Altmetric Badge
    Chapter 11 Short Proofs of Knowledge for Factoring
  13. Altmetric Badge
    Chapter 12 Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms
  14. Altmetric Badge
    Chapter 13 All-or-Nothing Transform and Remotely Keyed Encryption Protocols
  15. Altmetric Badge
    Chapter 14 Security of Public Key Certificate Based Authentication Protocols
  16. Altmetric Badge
    Chapter 15 Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2
  17. Altmetric Badge
    Chapter 16 Key Recovery in Third Generation Wireless Communication Systems
  18. Altmetric Badge
    Chapter 17 Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications
  19. Altmetric Badge
    Chapter 18 Certificates of Recoverability with Scalable Recovery Agent Security
  20. Altmetric Badge
    Chapter 19 Design Validations for Discrete Logarithm Based Signature Schemes
  21. Altmetric Badge
    Chapter 20 Optimally Efficient Accountable Time-Stamping
  22. Altmetric Badge
    Chapter 21 “Pseudorandom Intermixing”: A Tool for Shared Cryptography
  23. Altmetric Badge
    Chapter 22 RSA-Based Auto-recoverable Cryptosystems
  24. Altmetric Badge
    Chapter 23 Efficient and Fresh Certification
  25. Altmetric Badge
    Chapter 24 Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions
  26. Altmetric Badge
    Chapter 25 Cryptographic Approaches to Privacy in Forensic DNA Databases
  27. Altmetric Badge
    Chapter 26 Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes
  28. Altmetric Badge
    Chapter 27 Fast Implementation of Elliptic Curve Arithmetic in GF(p n )
  29. Altmetric Badge
    Chapter 28 An Auction Protocol Which Hides Bids of Losers
  30. Altmetric Badge
    Chapter 29 Forward Secrecy and Its Application to Future Mobile Communications Security
  31. Altmetric Badge
    Chapter 30 Selecting Cryptographic Key Sizes
  32. Altmetric Badge
    Chapter 31 A Structured ElGamal-Type Multisignature Scheme
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • High Attention Score compared to outputs of the same age (82nd percentile)
  • Above-average Attention Score compared to outputs of the same age and source (55th percentile)

Mentioned by

twitter
3 X users
wikipedia
5 Wikipedia pages

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
25 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Public Key Cryptography
Published by
Lecture notes in computer science, January 2000
DOI 10.1007/b75033
ISBNs
978-3-54-066967-8, 978-3-54-046588-1
Authors

Hideki Imai, Yuliang Zheng

Editors

Hideki Imai, Yuliang Zheng

X Demographics

X Demographics

The data shown below were collected from the profiles of 3 X users who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 25 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Indonesia 1 4%
Japan 1 4%
Unknown 23 92%

Demographic breakdown

Readers by professional status Count As %
Student > Master 8 32%
Student > Ph. D. Student 7 28%
Professor 2 8%
Student > Postgraduate 2 8%
Lecturer 2 8%
Other 4 16%
Readers by discipline Count As %
Computer Science 18 72%
Mathematics 4 16%
Pharmacology, Toxicology and Pharmaceutical Science 1 4%
Social Sciences 1 4%
Engineering 1 4%
Other 0 0%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 5. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 14 October 2022.
All research outputs
#6,103,547
of 23,523,017 outputs
Outputs from Lecture notes in computer science
#1,930
of 8,138 outputs
Outputs of similar age
#18,599
of 109,325 outputs
Outputs of similar age from Lecture notes in computer science
#8
of 18 outputs
Altmetric has tracked 23,523,017 research outputs across all sources so far. This one has received more attention than most of these and is in the 73rd percentile.
So far Altmetric has tracked 8,138 research outputs from this source. They typically receive a little more attention than average, with a mean Attention Score of 5.1. This one has done well, scoring higher than 75% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 109,325 tracked outputs that were published within six weeks on either side of this one in any source. This one has done well, scoring higher than 82% of its contemporaries.
We're also able to compare this research output to 18 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 55% of its contemporaries.