↓ Skip to main content

Advances in Cryptology – CRYPTO 2005

Overview of attention for book
Cover of 'Advances in Cryptology – CRYPTO 2005'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Efficient Collision Search Attacks on SHA-0
  3. Altmetric Badge
    Chapter 2 Finding Collisions in the Full SHA-1
  4. Altmetric Badge
    Chapter 3 Advances in Cryptology – CRYPTO 2005
  5. Altmetric Badge
    Chapter 4 Composition Does Not Imply Adaptive Security
  6. Altmetric Badge
    Chapter 5 On the Discrete Logarithm Problem on Algebraic Tori
  7. Altmetric Badge
    Chapter 6 A Practical Attack on a Braid Group Based Cryptographic Protocol
  8. Altmetric Badge
    Chapter 7 The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
  9. Altmetric Badge
    Chapter 8 Unconditional Characterizations of Non-interactive Zero-Knowledge
  10. Altmetric Badge
    Chapter 9 Impossibility and Feasibility Results for Zero Knowledge with Public Keys
  11. Altmetric Badge
    Chapter 10 Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
  12. Altmetric Badge
    Chapter 11 A Formal Treatment of Onion Routing
  13. Altmetric Badge
    Chapter 12 Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
  14. Altmetric Badge
    Chapter 13 Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
  15. Altmetric Badge
    Chapter 14 Private Searching on Streaming Data
  16. Altmetric Badge
    Chapter 15 Privacy-Preserving Set Operations
  17. Altmetric Badge
    Chapter 16 Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
  18. Altmetric Badge
    Chapter 17 Generic Transformation for Scalable Broadcast Encryption Schemes
  19. Altmetric Badge
    Chapter 18 Authenticating Pervasive Devices with Human Protocols
  20. Altmetric Badge
    Chapter 19 Secure Communications over Insecure Channels Based on Short Authenticated Strings
  21. Altmetric Badge
    Chapter 20 On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
  22. Altmetric Badge
    Chapter 21 Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
  23. Altmetric Badge
    Chapter 22 Secure Computation Without Authentication
  24. Altmetric Badge
    Chapter 23 Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
  25. Altmetric Badge
    Chapter 24 Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
  26. Altmetric Badge
    Chapter 25 Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
  27. Altmetric Badge
    Chapter 26 Merkle-Damgård Revisited: How to Construct a Hash Function
  28. Altmetric Badge
    Chapter 27 On the Generic Insecurity of the Full Domain Hash
  29. Altmetric Badge
    Chapter 28 New Monotones and Lower Bounds in Unconditional Two-Party Computation
  30. Altmetric Badge
    Chapter 29 One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
  31. Altmetric Badge
    Chapter 30 A Quantum Cipher with Near Optimal Key-Recycling
  32. Altmetric Badge
    Chapter 31 An Efficient CDH-Based Signature Scheme with a Tight Security Reduction
  33. Altmetric Badge
    Chapter 32 Improved Security Analyses for CBC MACs
  34. Altmetric Badge
    Chapter 33 HMQV: A High-Performance Secure Diffie-Hellman Protocol
Attention for Chapter 18: Authenticating Pervasive Devices with Human Protocols
Altmetric Badge

Citations

dimensions_citation
17 Dimensions

Readers on

mendeley
106 Mendeley
citeulike
2 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Authenticating Pervasive Devices with Human Protocols
Chapter number 18
Book title
Advances in Cryptology – CRYPTO 2005
Published by
Springer, Berlin, Heidelberg, August 2005
DOI 10.1007/11535218_18
Book ISBNs
978-3-54-028114-6, 978-3-54-031870-5
Authors

Ari Juels, Stephen A. Weis

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 106 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 2%
Germany 1 <1%
Switzerland 1 <1%
United Kingdom 1 <1%
Australia 1 <1%
Japan 1 <1%
Slovenia 1 <1%
Unknown 98 92%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 31 29%
Student > Master 20 19%
Researcher 11 10%
Student > Doctoral Student 6 6%
Professor 6 6%
Other 23 22%
Unknown 9 8%
Readers by discipline Count As %
Computer Science 70 66%
Engineering 11 10%
Physics and Astronomy 2 2%
Business, Management and Accounting 2 2%
Arts and Humanities 2 2%
Other 5 5%
Unknown 14 13%