↓ Skip to main content

Advances in Cryptology - ASIACRYPT 2009

Overview of attention for book
Cover of 'Advances in Cryptology - ASIACRYPT 2009'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Related-Key Cryptanalysis of the Full AES-192 and AES-256
  3. Altmetric Badge
    Chapter 2 The Key-Dependent Attack on Block Ciphers
  4. Altmetric Badge
    Chapter 3 Cascade Encryption Revisited
  5. Altmetric Badge
    Chapter 4 Quantum-Secure Coin-Flipping and Applications
  6. Altmetric Badge
    Chapter 5 On the Power of Two-Party Quantum Cryptography
  7. Altmetric Badge
    Chapter 6 Security Bounds for the Design of Code-Based Cryptosystems
  8. Altmetric Badge
    Chapter 7 Rebound Attack on the Full Lane Compression Function
  9. Altmetric Badge
    Chapter 8 Rebound Distinguishers: Results on the Full Whirlpool Compression Function
  10. Altmetric Badge
    Chapter 9 MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
  11. Altmetric Badge
    Chapter 10 The Intel AES Instructions Set and the SHA-3 Candidates
  12. Altmetric Badge
    Chapter 11 Group Encryption: Non-interactive Realization in the Standard Model
  13. Altmetric Badge
    Chapter 12 On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
  14. Altmetric Badge
    Chapter 13 Hierarchical Predicate Encryption for Inner-Products
  15. Altmetric Badge
    Chapter 14 Hedged Public-Key Encryption: How to Protect against Bad Randomness
  16. Altmetric Badge
    Chapter 15 Secure Two-Party Computation Is Practical
  17. Altmetric Badge
    Chapter 16 Secure Multi-party Computation Minimizing Online Rounds
  18. Altmetric Badge
    Chapter 17 Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
  19. Altmetric Badge
    Chapter 18 Non-malleable Statistically Hiding Commitment from Any One-Way Function
  20. Altmetric Badge
    Chapter 19 Proofs of Storage from Homomorphic Identification Protocols
  21. Altmetric Badge
    Chapter 20 Simple Adaptive Oblivious Transfer without Random Oracle
  22. Altmetric Badge
    Chapter 21 Improved Generic Algorithms for 3-Collisions
  23. Altmetric Badge
    Chapter 22 A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
  24. Altmetric Badge
    Chapter 23 How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
  25. Altmetric Badge
    Chapter 24 On the Analysis of Cryptographic Assumptions in the Generic Ring Model
  26. Altmetric Badge
    Chapter 25 Zero Knowledge in the Random Oracle Model, Revisited
  27. Altmetric Badge
    Chapter 26 A Framework for Universally Composable Non-committing Blind Signatures
  28. Altmetric Badge
    Chapter 27 Cryptanalysis of the Square Cryptosystems
  29. Altmetric Badge
    Chapter 28 Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses
  30. Altmetric Badge
    Chapter 29 Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?
  31. Altmetric Badge
    Chapter 30 Security Notions and Generic Constructions for Client Puzzles
  32. Altmetric Badge
    Chapter 31 Foundations of Non-malleable Hash and One-Way Functions
  33. Altmetric Badge
    Chapter 32 Improved Cryptanalysis of Skein
  34. Altmetric Badge
    Chapter 33 Linearization Framework for Collision Attacks: Application to CubeHash and MD6
  35. Altmetric Badge
    Chapter 34 Preimages for Step-Reduced SHA-2
  36. Altmetric Badge
    Chapter 35 Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures
  37. Altmetric Badge
    Chapter 36 Efficient Public Key Encryption Based on Ideal Lattices
  38. Altmetric Badge
    Chapter 37 Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
  39. Altmetric Badge
    Chapter 38 PSS Is Secure against Random Fault Attacks
  40. Altmetric Badge
    Chapter 39 Cache-Timing Template Attacks
  41. Altmetric Badge
    Chapter 40 Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
  42. Altmetric Badge
    Chapter 41 Signature Schemes with Bounded Leakage Resilience
Attention for Chapter 30: Security Notions and Generic Constructions for Client Puzzles
Altmetric Badge

Citations

dimensions_citation
10 Dimensions

Readers on

mendeley
52 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Security Notions and Generic Constructions for Client Puzzles
Chapter number 30
Book title
Advances in Cryptology – ASIACRYPT 2009
Published by
Springer Berlin Heidelberg, January 2009
DOI 10.1007/978-3-642-10366-7_30
Book ISBNs
978-3-64-210365-0, 978-3-64-210366-7
Authors

Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi

Editors

Mitsuru Matsui

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 52 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Germany 1 2%
Netherlands 1 2%
United Kingdom 1 2%
China 1 2%
Greece 1 2%
Unknown 47 90%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 14 27%
Student > Master 12 23%
Researcher 8 15%
Other 4 8%
Student > Postgraduate 4 8%
Other 6 12%
Unknown 4 8%
Readers by discipline Count As %
Computer Science 40 77%
Mathematics 2 4%
Physics and Astronomy 2 4%
Engineering 2 4%
Design 1 2%
Other 0 0%
Unknown 5 10%