↓ Skip to main content

Topics in Cryptology –- CT-RSA 2015

Overview of attention for book
Cover of 'Topics in Cryptology –- CT-RSA 2015'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Just a Little Bit More
  3. Altmetric Badge
    Chapter 2 Cache Storage Attacks
  4. Altmetric Badge
    Chapter 3 Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows
  5. Altmetric Badge
    Chapter 4 Improved Attacks on Reduced-Round Camellia-128/192/256
  6. Altmetric Badge
    Chapter 5 Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
  7. Altmetric Badge
    Chapter 6 Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts
  8. Altmetric Badge
    Chapter 7 Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
  9. Altmetric Badge
    Chapter 8 Non-Interactive Zero-Knowledge Proofs of Non-Membership
  10. Altmetric Badge
    Chapter 9 Implementing GCM on ARMv8
  11. Altmetric Badge
    Chapter 10 Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON
  12. Altmetric Badge
    Chapter 11 Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
  13. Altmetric Badge
    Chapter 12 Format Oracles on OpenPGP
  14. Altmetric Badge
    Chapter 13 Finding Shortest Lattice Vectors in the Presence of Gaps
  15. Altmetric Badge
    Chapter 14 A Simple and Improved Algorithm for Integer Factorization with Implicit Hints
  16. Altmetric Badge
    Chapter 15 Hash Functions from Defective Ideal Ciphers
  17. Altmetric Badge
    Chapter 16 Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication
  18. Altmetric Badge
    Chapter 17 Efficient Leakage Resilient Circuit Compilers
  19. Altmetric Badge
    Chapter 18 Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
  20. Altmetric Badge
    Chapter 19 How to Incorporate Associated Data in Sponge-Based Authenticated Encryption
  21. Altmetric Badge
    Chapter 20 Cryptanalysis of Ascon
  22. Altmetric Badge
    Chapter 21 Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions
  23. Altmetric Badge
    Chapter 22 Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption
  24. Altmetric Badge
    Chapter 23 Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
  25. Altmetric Badge
    Chapter 24 Cold Boot Attacks in the Discrete Logarithm Setting
  26. Altmetric Badge
    Chapter 25 Communication Optimal Tardos-Based Asymmetric Fingerprinting
  27. Altmetric Badge
    Chapter 26 Linearly Homomorphic Encryption from \(\mathsf {DDH}\)
Overall attention for this book and its chapters
Altmetric Badge

About this Attention Score

  • Good Attention Score compared to outputs of the same age (70th percentile)
  • Good Attention Score compared to outputs of the same age and source (73rd percentile)

Mentioned by

twitter
1 X user
wikipedia
1 Wikipedia page

Citations

dimensions_citation
3 Dimensions

Readers on

mendeley
15 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Topics in Cryptology –- CT-RSA 2015
Published by
Lecture notes in computer science, March 2015
DOI 10.1007/978-3-319-16715-2
ISBNs
978-3-31-916714-5, 978-3-31-916715-2
Authors

van de Pol, Joop, Smart, Nigel P., Yarom, Yuval

Editors

Kaisa Nyberg

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 15 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 15 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 20%
Student > Doctoral Student 2 13%
Researcher 2 13%
Student > Postgraduate 2 13%
Professor > Associate Professor 1 7%
Other 1 7%
Unknown 4 27%
Readers by discipline Count As %
Computer Science 7 47%
Philosophy 1 7%
Mathematics 1 7%
Engineering 1 7%
Unknown 5 33%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 4. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 24 December 2019.
All research outputs
#6,433,620
of 22,858,915 outputs
Outputs from Lecture notes in computer science
#2,108
of 8,127 outputs
Outputs of similar age
#74,377
of 259,198 outputs
Outputs of similar age from Lecture notes in computer science
#25
of 94 outputs
Altmetric has tracked 22,858,915 research outputs across all sources so far. This one has received more attention than most of these and is in the 70th percentile.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one has gotten more attention than average, scoring higher than 72% of its peers.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 259,198 tracked outputs that were published within six weeks on either side of this one in any source. This one has gotten more attention than average, scoring higher than 70% of its contemporaries.
We're also able to compare this research output to 94 others from the same source and published within six weeks on either side of this one. This one has gotten more attention than average, scoring higher than 73% of its contemporaries.