↓ Skip to main content

Information Security and Cryptology — ICISC 2001 : 4th International Conference Seoul, Korea, December 6–7,2001 Proceedings

Overview of attention for book
Cover of 'Information Security and Cryptology — ICISC 2001 : 4th International Conference Seoul, Korea, December 6–7,2001 Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Practical Security in Public-Key Cryptography
  3. Altmetric Badge
    Chapter 2 A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances
  4. Altmetric Badge
    Chapter 3 Truncated Differential Cryptanalysis of Camellia
  5. Altmetric Badge
    Chapter 4 Improved Impossible Differential Cryptanalysis of Rijndael and Crypton
  6. Altmetric Badge
    Chapter 5 Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
  7. Altmetric Badge
    Chapter 6 An IND-CCA2 Public-Key Cryptosystem with Fast Decryption
  8. Altmetric Badge
    Chapter 7 Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm
  9. Altmetric Badge
    Chapter 8 Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring
  10. Altmetric Badge
    Chapter 9 Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
  11. Altmetric Badge
    Chapter 10 Decentralized Event Correlation for Intrusion Detection
  12. Altmetric Badge
    Chapter 11 Enhancing the Security of Cookies
  13. Altmetric Badge
    Chapter 12 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation
  14. Altmetric Badge
    Chapter 13 Efficient Revocation Schemes for Secure Multicast
  15. Altmetric Badge
    Chapter 14 Binary Codes for Collusion-Secure Fingerprinting
  16. Altmetric Badge
    Chapter 15 Information Security and Cryptology — ICISC 2001
  17. Altmetric Badge
    Chapter 16 Off-Line Authentication Using Watermarks
  18. Altmetric Badge
    Chapter 17 Slide Attacks with a Known-Plaintext Cryptanalysis
  19. Altmetric Badge
    Chapter 18 Information Security and Cryptology — ICISC 2001
  20. Altmetric Badge
    Chapter 19 Private Computation with Shared Randomness over Broadcast Channel
  21. Altmetric Badge
    Chapter 20 An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
  22. Altmetric Badge
    Chapter 21 Practical Reasoning about Accountability in Electronic Commerce Protocols
  23. Altmetric Badge
    Chapter 22 Content Extraction Signatures
  24. Altmetric Badge
    Chapter 23 New Signcryption Schemes Based on KCDSA
  25. Altmetric Badge
    Chapter 24 An Efficient and Provably Secure Threshold Blind Signature
  26. Altmetric Badge
    Chapter 25 A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks
  27. Altmetric Badge
    Chapter 26 A Distributed Light-Weight Authentication Model for Ad-hoc Networks
  28. Altmetric Badge
    Chapter 27 Design of an Authentication Protocol for Gsm Javacards
  29. Altmetric Badge
    Chapter 28 Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment
  30. Altmetric Badge
    Chapter 29 Protecting General Flexible Itineraries of Mobile Agents
  31. Altmetric Badge
    Chapter 30 RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
  32. Altmetric Badge
    Chapter 31 A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
  33. Altmetric Badge
    Chapter 32 A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks
  34. Altmetric Badge
    Chapter 33 DPA Countermeasure Based on the “Masking Method”
Attention for Chapter 33: DPA Countermeasure Based on the “Masking Method”
Altmetric Badge

Citations

dimensions_citation
14 Dimensions

Readers on

mendeley
27 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
DPA Countermeasure Based on the “Masking Method”
Chapter number 33
Book title
Information Security and Cryptology — ICISC 2001
Published by
Springer, Berlin, Heidelberg, December 2001
DOI 10.1007/3-540-45861-1_33
Book ISBNs
978-3-54-043319-4, 978-3-54-045861-6
Authors

Kouichi Itoh, Masahiko Takenaka, Naoya Torii

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 27 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Spain 1 4%
Unknown 26 96%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 7 26%
Student > Master 4 15%
Researcher 3 11%
Professor 3 11%
Professor > Associate Professor 2 7%
Other 4 15%
Unknown 4 15%
Readers by discipline Count As %
Computer Science 20 74%
Engineering 2 7%
Physics and Astronomy 1 4%
Unknown 4 15%