↓ Skip to main content

Advances in Cryptology — CRYPTO ’85 Proceedings

Overview of attention for book
Cover of 'Advances in Cryptology — CRYPTO ’85 Proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields
  3. Altmetric Badge
    Chapter 2 Another Birthday Attack
  4. Altmetric Badge
    Chapter 3 Attacks on Some RSA Signatures
  5. Altmetric Badge
    Chapter 4 An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi
  6. Altmetric Badge
    Chapter 5 A Secure Subliminal Channel (?)
  7. Altmetric Badge
    Chapter 6 Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences
  8. Altmetric Badge
    Chapter 7 On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract)
  9. Altmetric Badge
    Chapter 8 A Secure Poker Protocol that Minimizes the Effect of Player Coalitions
  10. Altmetric Badge
    Chapter 9 A Framework for the Study of Cryptographic Protocols
  11. Altmetric Badge
    Chapter 10 Cheating at Mental Poker
  12. Altmetric Badge
    Chapter 11 Security for the DoD Transmission Control Protocol
  13. Altmetric Badge
    Chapter 12 Symmetric Public-Key Encryption
  14. Altmetric Badge
    Chapter 13 Software Protection: Myth or Reality?
  15. Altmetric Badge
    Chapter 14 Public Protection of Software
  16. Altmetric Badge
    Chapter 15 Fingerprinting Long Forgiving Messages
  17. Altmetric Badge
    Chapter 16 Cryptanalysis of des with a Reduced Number of Rounds
  18. Altmetric Badge
    Chapter 17 Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract)
  19. Altmetric Badge
    Chapter 18 A Layered Approach to the Design of Private Key Cryptosystems
  20. Altmetric Badge
    Chapter 19 Lifetimes of Keys in Cryptographic Key Management Systems
  21. Altmetric Badge
    Chapter 20 Correlation Immunity and the Summation Generator
  22. Altmetric Badge
    Chapter 21 Design of Combiners to Prevent Divide and Conquer Attacks
  23. Altmetric Badge
    Chapter 22 On the Security of DES
  24. Altmetric Badge
    Chapter 23 Information theory without the finiteness assumption, II. Unfolding the DES
  25. Altmetric Badge
    Chapter 24 Analysis of a Public Key Approach Based on Polynomial Substitution
  26. Altmetric Badge
    Chapter 25 Developing an RSA Chip
  27. Altmetric Badge
    Chapter 26 An M3 Public-Key Encryption Scheme
  28. Altmetric Badge
    Chapter 27 Trapdoor Rings And Their Use In Cryptography
  29. Altmetric Badge
    Chapter 28 On Computing Logarithms Over Finite Fields
  30. Altmetric Badge
    Chapter 29 N Using RSA with Low Exponent in a Public Key Network
  31. Altmetric Badge
    Chapter 30 Lenstra’s Factorisation Method Based on Elliptic Curves
  32. Altmetric Badge
    Chapter 31 Use of Elliptic Curves in Cryptography
  33. Altmetric Badge
    Chapter 32 Cryptography with Cellular Automata
  34. Altmetric Badge
    Chapter 33 Efficient Parallel Pseudo-Random Number Generation
  35. Altmetric Badge
    Chapter 34 How to Construct Pseudo-random Permutations from Pseudo-random Functions
  36. Altmetric Badge
    Chapter 35 The Bit Security of Modular Squaring given Partial Factorization of the Modulos
  37. Altmetric Badge
    Chapter 36 Some Cryptographic Aspects of Womcodes
  38. Altmetric Badge
    Chapter 37 How to Reduce your Enemy’s Information (extended abstract)
  39. Altmetric Badge
    Chapter 38 Encrypting Problem Instances
  40. Altmetric Badge
    Chapter 39 Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis
  41. Altmetric Badge
    Chapter 40 A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
  42. Altmetric Badge
    Chapter 41 On the Design of S-Boxes
  43. Altmetric Badge
    Chapter 42 The Real Reason for Rivest’s Phenomenon
  44. Altmetric Badge
    Chapter 43 The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ≤ 48 Bit Keys?)
  45. Altmetric Badge
    Chapter 44 Access Control at the Netherlands Postal and Telecommunications Services
Attention for Chapter 31: Use of Elliptic Curves in Cryptography
Altmetric Badge

Mentioned by

twitter
3 tweeters
patent
2 patents
wikipedia
1 Wikipedia page

Citations

dimensions_citation
9 Dimensions

Readers on

mendeley
358 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Use of Elliptic Curves in Cryptography
Chapter number 31
Book title
Advances in Cryptology — CRYPTO ’85 Proceedings
Published in
Advances in Cryptology CRYPTO 85 Santa Barbara California USA August 1822 1985 Proceedings, January 1985
DOI 10.1007/3-540-39799-x_31
Book ISBNs
978-3-54-016463-0, 978-3-54-039799-1
Authors

Victor S. Miller

Twitter Demographics

The data shown below were collected from the profiles of 3 tweeters who shared this research output. Click here to find out more about how the information was compiled.

Mendeley readers

The data shown below were compiled from readership statistics for 358 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Malaysia 3 <1%
Germany 2 <1%
United States 2 <1%
India 2 <1%
Korea, Republic of 1 <1%
Netherlands 1 <1%
Canada 1 <1%
Iran, Islamic Republic of 1 <1%
Taiwan 1 <1%
Other 3 <1%
Unknown 341 95%

Demographic breakdown

Readers by professional status Count As %
Student > Master 84 23%
Student > Ph. D. Student 83 23%
Researcher 35 10%
Student > Bachelor 32 9%
Student > Postgraduate 20 6%
Other 68 19%
Unknown 36 10%
Readers by discipline Count As %
Computer Science 187 52%
Engineering 58 16%
Mathematics 41 11%
Physics and Astronomy 9 3%
Business, Management and Accounting 3 <1%
Other 13 4%
Unknown 47 13%