↓ Skip to main content

Security Engineering and Intelligence Informatics

Overview of attention for book
Cover of 'Security Engineering and Intelligence Informatics'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock
  3. Altmetric Badge
    Chapter 2 Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions
  4. Altmetric Badge
    Chapter 3 On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
  5. Altmetric Badge
    Chapter 4 Code-Based Public-Key Encryption Resistant to Key Leakage
  6. Altmetric Badge
    Chapter 5 Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
  7. Altmetric Badge
    Chapter 6 A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images
  8. Altmetric Badge
    Chapter 7 Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method
  9. Altmetric Badge
    Chapter 8 On the Security of LBlock against the Cube Attack and Side Channel Cube Attack
  10. Altmetric Badge
    Chapter 9 Code-Based Identification and Signature Schemes in Software
  11. Altmetric Badge
    Chapter 10 Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
  12. Altmetric Badge
    Chapter 11 Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves
  13. Altmetric Badge
    Chapter 12 Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves
  14. Altmetric Badge
    Chapter 13 Cumulus4j: A Provably Secure Database Abstraction Layer
  15. Altmetric Badge
    Chapter 14 Optimal Parameters for XMSS MT
  16. Altmetric Badge
    Chapter 15 Solving the Discrete Logarithm Problem for Packing Candidate Preferences
  17. Altmetric Badge
    Chapter 16 SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences
  18. Altmetric Badge
    Chapter 17 Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace
  19. Altmetric Badge
    Chapter 18 Analyzing the Internet Stability in Presence of Disasters
  20. Altmetric Badge
    Chapter 19 Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project
  21. Altmetric Badge
    Chapter 20 How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function
  22. Altmetric Badge
    Chapter 21 Using Probabilistic Analysis for the Certification of Machine Control Systems
  23. Altmetric Badge
    Chapter 22 Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms
  24. Altmetric Badge
    Chapter 23 A Multiple-Key Management Scheme in Wireless Sensor Networks
  25. Altmetric Badge
    Chapter 24 VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment
  26. Altmetric Badge
    Chapter 25 A Denial of Service attack to GSM networks via attach procedure
  27. Altmetric Badge
    Chapter 26 PPM: Privacy Policy Manager for Personalized Services
  28. Altmetric Badge
    Chapter 27 An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks
  29. Altmetric Badge
    Chapter 28 Intelligent UBMSS Systems for Strategic Information Management
  30. Altmetric Badge
    Chapter 29 Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness
  31. Altmetric Badge
    Chapter 30 Computer Karate Trainer in Tasks of Personal and Homeland Security Defense
  32. Altmetric Badge
    Chapter 31 Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios
  33. Altmetric Badge
    Chapter 32 A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process
Attention for Chapter 12: Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves
Altmetric Badge

Readers on

mendeley
4 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves
Chapter number 12
Book title
Security Engineering and Intelligence Informatics
Published by
Springer, Berlin, Heidelberg, September 2013
DOI 10.1007/978-3-642-40588-4_12
Book ISBNs
978-3-64-240587-7, 978-3-64-240588-4
Authors

Christian Hanser, Christian Wagner

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 4 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 4 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 1 25%
Researcher 1 25%
Student > Postgraduate 1 25%
Other 1 25%
Readers by discipline Count As %
Computer Science 3 75%
Design 1 25%