↓ Skip to main content

Information and Communication Technology

Overview of attention for book
Cover of 'Information and Communication Technology'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Reducing Keepalive Traffic in Software-Defined Mobile Networks with Port Control Protocol
  3. Altmetric Badge
    Chapter 2 A SDN Based Method of TCP Connection Handover
  4. Altmetric Badge
    Chapter 3 IP Data Delivery in HBB-Next Network Architecture
  5. Altmetric Badge
    Chapter 4 Syn Flood Attack Detection and Type Distinguishing Mechanism Based on Counting Bloom Filter
  6. Altmetric Badge
    Chapter 5 Integrating Mobile OpenFlow Based Network Architecture with Legacy Infrastructure
  7. Altmetric Badge
    Chapter 6 Making Computer Science Education Relevant
  8. Altmetric Badge
    Chapter 7 Analyzing Brain Waves for Activity Recognition of Learners
  9. Altmetric Badge
    Chapter 8 A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation
  10. Altmetric Badge
    Chapter 9 Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomerative Clustering Algorithm Based on Browsing History
  11. Altmetric Badge
    Chapter 10 Strength of Relationship Between Multi-labeled Data and Labels
  12. Altmetric Badge
    Chapter 11 Online Ad-fraud in Search Engine Advertising Campaigns
  13. Altmetric Badge
    Chapter 12 Markov Chain Solution to the 3-Tower Problem
  14. Altmetric Badge
    Chapter 13 Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem
  15. Altmetric Badge
    Chapter 14 Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons
  16. Altmetric Badge
    Chapter 15 Can We Securely Use CBC Mode in TLS1.0?
  17. Altmetric Badge
    Chapter 16 Key Agreement with Modified Batch Rekeying for Distributed Group in Cognitive Radio Networks
  18. Altmetric Badge
    Chapter 17 Secure Mobility Management for MIPv6 with Identity-Based Cryptography
  19. Altmetric Badge
    Chapter 18 Investigation of DDoS Attacks by Hybrid Simulation
  20. Altmetric Badge
    Chapter 19 Secure Database Using Order-Preserving Encryption Scheme Based on Arithmetic Coding and Noise Function
  21. Altmetric Badge
    Chapter 20 An Approach for Evaluating Softgoals Using Weight
  22. Altmetric Badge
    Chapter 21 An Efficient Unsavory Data Detection Method for Internet Big Data
  23. Altmetric Badge
    Chapter 22 Identification of Corrupted Cloud Storage in Batch Auditing
  24. Altmetric Badge
    Chapter 23 Face Recognition Performance Comparison Between Real Faces and Pose Variant Face Images from Image Display Device
  25. Altmetric Badge
    Chapter 24 A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions
  26. Altmetric Badge
    Chapter 25 Secure Image Deduplication in Cloud Storage
  27. Altmetric Badge
    Chapter 26 Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse
  28. Altmetric Badge
    Chapter 27 Differential Fault Attack on LEA
  29. Altmetric Badge
    Chapter 28 A Secure Multicast Key Agreement Scheme
  30. Altmetric Badge
    Chapter 29 Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution
  31. Altmetric Badge
    Chapter 30 DCODE: A Distributed Column-Oriented Database Engine for Big Data Analytics
  32. Altmetric Badge
    Chapter 31 Incorporating Big Data Analytics into Enterprise Information Systems
  33. Altmetric Badge
    Chapter 32 Analytical Platform Based on Jbowl Library Providing Text-Mining Services in Distributed Environment
  34. Altmetric Badge
    Chapter 33 Corporate Social Responsibility in Social Media Environment
  35. Altmetric Badge
    Chapter 34 Usage of Finance Information Systems in Developing Countries: Identifying Factors During Implementation that Impact Use
  36. Altmetric Badge
    Chapter 35 Software Model Creation with Multidimensional UML
Attention for Chapter 27: Differential Fault Attack on LEA
Altmetric Badge

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
1 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Differential Fault Attack on LEA
Chapter number 27
Book title
Information and Communication Technology
Published by
Springer, Cham, October 2015
DOI 10.1007/978-3-319-24315-3_27
Book ISBNs
978-3-31-924314-6, 978-3-31-924315-3
Authors

Dirmanto Jap, Jakub Breier, Jap, Dirmanto, Breier, Jakub

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 1 Mendeley reader of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 1 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 100%
Readers by discipline Count As %
Computer Science 1 100%