↓ Skip to main content

Applied Cryptography and Network Security

Overview of attention for book
Cover of 'Applied Cryptography and Network Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 On the Broadcast and Validity-Checking Security of pkcs #1 v1.5 Encryption
  3. Altmetric Badge
    Chapter 2 How to Construct Interval Encryption from Binary Tree Encryption
  4. Altmetric Badge
    Chapter 3 Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
  5. Altmetric Badge
    Chapter 4 Trapdoor Sanitizable Signatures Made Easy
  6. Altmetric Badge
    Chapter 5 Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
  7. Altmetric Badge
    Chapter 6 Redactable Signatures for Tree-Structured Data: Definitions and Constructions
  8. Altmetric Badge
    Chapter 7 Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
  9. Altmetric Badge
    Chapter 8 Multi-trail Statistical Saturation Attacks
  10. Altmetric Badge
    Chapter 9 Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G  ⊕ 
  11. Altmetric Badge
    Chapter 10 High Performance GHASH Function for Long Messages
  12. Altmetric Badge
    Chapter 11 Principles on the Security of AES against First and Second-Order Differential Power Analysis
  13. Altmetric Badge
    Chapter 12 Adaptive Chosen-Message Side-Channel Attacks
  14. Altmetric Badge
    Chapter 13 Secure Multiplicative Masking of Power Functions
  15. Altmetric Badge
    Chapter 14 Batch Groth–Sahai
  16. Altmetric Badge
    Chapter 15 Efficient and Secure Evaluation of Multivariate Polynomials and Applications
  17. Altmetric Badge
    Chapter 16 Efficient Implementation of the Orlandi Protocol
  18. Altmetric Badge
    Chapter 17 Improving the Round Complexity of Traitor Tracing Schemes
  19. Altmetric Badge
    Chapter 18 Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters
  20. Altmetric Badge
    Chapter 19 Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
  21. Altmetric Badge
    Chapter 20 Deniable Internet Key Exchange
  22. Altmetric Badge
    Chapter 21 A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
  23. Altmetric Badge
    Chapter 22 Secure Sketch for Multiple Secrets
  24. Altmetric Badge
    Chapter 23 A Message Recognition Protocol Based on Standard Assumptions
  25. Altmetric Badge
    Chapter 24 Affiliation-Hiding Key Exchange with Untrusted Group Authorities
  26. Altmetric Badge
    Chapter 25 Privacy-Preserving Group Discovery with Linear Complexity
  27. Altmetric Badge
    Chapter 26 Two New Efficient PIR-Writing Protocols
  28. Altmetric Badge
    Chapter 27 Regulatory Compliant Oblivious RAM
  29. Altmetric Badge
    Chapter 28 Revisiting Unpredictability-Based RFID Privacy Models
  30. Altmetric Badge
    Chapter 29 On RFID Privacy with Mutual Authentication and Tag Corruption
  31. Altmetric Badge
    Chapter 30 Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures
  32. Altmetric Badge
    Chapter 31 COP: A Step toward Children Online Privacy
  33. Altmetric Badge
    Chapter 32 A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Attention for Chapter 21: A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Altmetric Badge

Citations

dimensions_citation
5 Dimensions

Readers on

mendeley
26 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm
Chapter number 21
Book title
Applied Cryptography and Network Security
Published in
Lecture notes in computer science, January 2010
DOI 10.1007/978-3-642-13708-2_21
Book ISBNs
978-3-64-213707-5, 978-3-64-213708-2
Authors

Asghar, Hassan Jameel, Pieprzyk, Josef, Wang, Huaxiong, Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 26 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United Kingdom 2 8%
Unknown 24 92%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 31%
Student > Master 5 19%
Lecturer 2 8%
Researcher 2 8%
Other 1 4%
Other 4 15%
Unknown 4 15%
Readers by discipline Count As %
Computer Science 20 77%
Mathematics 1 4%
Physics and Astronomy 1 4%
Unknown 4 15%