↓ Skip to main content

Information Security and Cryptology - ICISC 2014

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2014'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
  3. Altmetric Badge
    Chapter 2 On the Security of Distributed Multiprime RSA
  4. Altmetric Badge
    Chapter 3 Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs
  5. Altmetric Badge
    Chapter 4 Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme
  6. Altmetric Badge
    Chapter 5 Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree $$1$$
  7. Altmetric Badge
    Chapter 6 Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks
  8. Altmetric Badge
    Chapter 7 A Fast Phase-based Enumeration Algorithm for SVP Challenge Through $$y$$ y -Sparse Representations of Short Lattice Vectors
  9. Altmetric Badge
    Chapter 8 How Much Can Complexity of Linear Cryptanalysis Be Reduced?
  10. Altmetric Badge
    Chapter 9 Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers
  11. Altmetric Badge
    Chapter 10 Bicliques with Minimal Data and Time Complexity for AES
  12. Altmetric Badge
    Chapter 11 Fault Analysis on SIMON Family of Lightweight Block Ciphers
  13. Altmetric Badge
    Chapter 12 A Clustering Approach for Privacy-Preserving in Social Networks
  14. Altmetric Badge
    Chapter 13 Securely Solving Classical Network Flow Problems
  15. Altmetric Badge
    Chapter 14 Remote IP Protection Using Timing Channels
  16. Altmetric Badge
    Chapter 15 Detecting Camouflaged Applications on Mobile Application Markets
  17. Altmetric Badge
    Chapter 16 WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps
  18. Altmetric Badge
    Chapter 17 A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
  19. Altmetric Badge
    Chapter 18 LSH: A New Fast Secure Hash Function Family
  20. Altmetric Badge
    Chapter 19 Lossless Data Hiding for Binary Document Images Using $$n$$ n -Pairs Pattern
  21. Altmetric Badge
    Chapter 20 Montgomery Modular Multiplication on ARM-NEON Revisited
  22. Altmetric Badge
    Chapter 21 A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function
  23. Altmetric Badge
    Chapter 22 Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols
  24. Altmetric Badge
    Chapter 23 Compact and Efficient UC Commitments Under Atomic-Exchanges
  25. Altmetric Badge
    Chapter 24 Issuer-Free Adaptive Oblivious Transfer with Access Policy
  26. Altmetric Badge
    Chapter 25 Memory Address Side-Channel Analysis on Exponentiation
  27. Altmetric Badge
    Chapter 26 Mutant Differential Fault Analysis of Trivium MDFA
Attention for Chapter 6: Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks
Altmetric Badge

Readers on

mendeley
18 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks
Chapter number 6
Book title
Information Security and Cryptology - ICISC 2014
Published by
Springer, Cham, December 2014
DOI 10.1007/978-3-319-15943-0_6
Book ISBNs
978-3-31-915942-3, 978-3-31-915943-0
Authors

Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka, Kitagawa, Fuyuki, Matsuda, Takahiro, Hanaoka, Goichiro, Tanaka, Keisuke

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 18 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 18 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 33%
Student > Master 4 22%
Researcher 2 11%
Professor 1 6%
Other 1 6%
Other 2 11%
Unknown 2 11%
Readers by discipline Count As %
Computer Science 15 83%
Physics and Astronomy 1 6%
Unknown 2 11%