↓ Skip to main content

Information Security and Cryptology -- ICISC 2012

Overview of attention for book
Cover of 'Information Security and Cryptology -- ICISC 2012'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 ML Confidential: Machine Learning on Encrypted Data
  3. Altmetric Badge
    Chapter 2 Another Look at Affine-Padding RSA Signatures
  4. Altmetric Badge
    Chapter 3 On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis
  5. Altmetric Badge
    Chapter 4 Balanced Indexing Method for Efficient Intrusion Detection Systems
  6. Altmetric Badge
    Chapter 5 Quantitative Questions on Attack–Defense Trees
  7. Altmetric Badge
    Chapter 6 DNS Tunneling for Network Penetration
  8. Altmetric Badge
    Chapter 7 MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring
  9. Altmetric Badge
    Chapter 8 iBinHunt: Binary Hunting with Inter-procedural Control Flow
  10. Altmetric Badge
    Chapter 9 Sometimes It’s Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys
  11. Altmetric Badge
    Chapter 10 Improved Impossible Differential Attacks on Large-Block Rijndael
  12. Altmetric Badge
    Chapter 11 Cube Cryptanalysis of LBlock with Noisy Leakage
  13. Altmetric Badge
    Chapter 12 Comprehensive Study of Integral Analysis on 22-Round LBlock
  14. Altmetric Badge
    Chapter 13 New Impossible Differential Attack on SAFER  +  and SAFER  + + 
  15. Altmetric Badge
    Chapter 14 An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol
  16. Altmetric Badge
    Chapter 15 Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms
  17. Altmetric Badge
    Chapter 16 Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol
  18. Altmetric Badge
    Chapter 17 A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles
  19. Altmetric Badge
    Chapter 18 Ciphertext Policy Multi-dimensional Range Encryption
  20. Altmetric Badge
    Chapter 19 Speeding Up Ate Pairing Computation in Affine Coordinates
  21. Altmetric Badge
    Chapter 20 An Improved Hardware Implementation of the Grain-128a Stream Cipher
  22. Altmetric Badge
    Chapter 21 Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers
  23. Altmetric Badge
    Chapter 22 Trusted Launch of Virtual Machine Instances in Public IaaS Environments
  24. Altmetric Badge
    Chapter 23 Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines
  25. Altmetric Badge
    Chapter 24 Information Security and Cryptology – ICISC 2012
  26. Altmetric Badge
    Chapter 25 Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
  27. Altmetric Badge
    Chapter 26 Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT -Like Ciphers
  28. Altmetric Badge
    Chapter 27 Security Evaluation of Cryptographic Modules against Profiling Attacks
  29. Altmetric Badge
    Chapter 28 Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
  30. Altmetric Badge
    Chapter 29 Efficient Group Signatures in the Standard Model
  31. Altmetric Badge
    Chapter 30 Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures
  32. Altmetric Badge
    Chapter 31 Linear Recurring Sequences for the UOV Key Generation Revisited
  33. Altmetric Badge
    Chapter 32 Galindo-Garcia Identity-Based Signature Revisited
  34. Altmetric Badge
    Chapter 33 Private Over-Threshold Aggregation Protocols
  35. Altmetric Badge
    Chapter 34 Retracted: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard
  36. Altmetric Badge
    Chapter 35 Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
  37. Altmetric Badge
    Chapter 36 Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard
Attention for Chapter 1: ML Confidential: Machine Learning on Encrypted Data
Altmetric Badge

Mentioned by

patent
2 patents

Readers on

mendeley
201 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
ML Confidential: Machine Learning on Encrypted Data
Chapter number 1
Book title
Information Security and Cryptology – ICISC 2012
Published by
Springer, Berlin, Heidelberg, November 2012
DOI 10.1007/978-3-642-37682-5_1
Book ISBNs
978-3-64-237681-8, 978-3-64-237682-5
Authors

Thore Graepel, Kristin Lauter, Michael Naehrig

Mendeley readers

The data shown below were compiled from readership statistics for 201 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 2 <1%
Italy 1 <1%
Korea, Republic of 1 <1%
Pakistan 1 <1%
United Kingdom 1 <1%
Taiwan 1 <1%
Greece 1 <1%
Germany 1 <1%
Unknown 192 96%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 66 33%
Student > Master 39 19%
Researcher 18 9%
Student > Bachelor 17 8%
Professor > Associate Professor 8 4%
Other 29 14%
Unknown 24 12%
Readers by discipline Count As %
Computer Science 130 65%
Engineering 20 10%
Mathematics 10 5%
Agricultural and Biological Sciences 4 2%
Physics and Astronomy 2 <1%
Other 8 4%
Unknown 27 13%