↓ Skip to main content

Information Security and Privacy

Overview of attention for book
Cover of 'Information Security and Privacy'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Multi-service Oriented Broadcast Encryption
  3. Altmetric Badge
    Chapter 2 Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme
  4. Altmetric Badge
    Chapter 3 Linear Code Implies Public-Key Traitor Tracing with Revocation
  5. Altmetric Badge
    Chapter 4 TTS without Revocation Capability Secure Against CCA2
  6. Altmetric Badge
    Chapter 5 Single Database Private Information Retrieval with Logarithmic Communication
  7. Altmetric Badge
    Chapter 6 Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions
  8. Altmetric Badge
    Chapter 7 Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
  9. Altmetric Badge
    Chapter 8 NGSCB: A Trusted Open System
  10. Altmetric Badge
    Chapter 9 The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers
  11. Altmetric Badge
    Chapter 10 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
  12. Altmetric Badge
    Chapter 11 The Related-Key Rectangle Attack – Application to SHACAL-1
  13. Altmetric Badge
    Chapter 12 Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1
  14. Altmetric Badge
    Chapter 13 The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders
  15. Altmetric Badge
    Chapter 14 Analysis of a Conference Scheme Under Active and Passive Attacks
  16. Altmetric Badge
    Chapter 15 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols
  17. Altmetric Badge
    Chapter 16 Analysis and Improvement of Micali’s Fair Contract Signing Protocol
  18. Altmetric Badge
    Chapter 17 Digital Signature Schemes with Domain Parameters
  19. Altmetric Badge
    Chapter 18 Generic Construction of Certificateless Signature
  20. Altmetric Badge
    Chapter 19 A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
  21. Altmetric Badge
    Chapter 20 How to Re-use Round Function in Super-Pseudorandom Permutation
  22. Altmetric Badge
    Chapter 21 How to Remove MAC from DHIES
  23. Altmetric Badge
    Chapter 22 Symmetric Key Authentication Services Revisited
  24. Altmetric Badge
    Chapter 23 Improvements to the Point Halving Algorithm
  25. Altmetric Badge
    Chapter 24 Theoretical Analysis of XL over Small Fields
  26. Altmetric Badge
    Chapter 25 A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
  27. Altmetric Badge
    Chapter 26 A Mobile Agent System Providing Offer Privacy
  28. Altmetric Badge
    Chapter 27 Identity-Based Strong Designated Verifier Signature Schemes
  29. Altmetric Badge
    Chapter 28 Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
  30. Altmetric Badge
    Chapter 29 A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups
  31. Altmetric Badge
    Chapter 30 Convertible Nominative Signatures
  32. Altmetric Badge
    Chapter 31 Protocols with Security Proofs for Mobile Applications
  33. Altmetric Badge
    Chapter 32 Secure Bilinear Diffie-Hellman Bits
  34. Altmetric Badge
    Chapter 33 Weak Property of Malleability in NTRUSign
  35. Altmetric Badge
    Chapter 34 Information Security Risk Assessment, Aggregation, and Mitigation
  36. Altmetric Badge
    Chapter 35 A Weighted Graph Approach to Authorization Delegation and Conflict Resolution
  37. Altmetric Badge
    Chapter 36 Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems
  38. Altmetric Badge
    Chapter 37 Unconditionally Secure Encryption Under Strong Attacks
  39. Altmetric Badge
    Chapter 38 ManTiCore: Encryption with Joint Cipher-State Authentication
  40. Altmetric Badge
    Chapter 39 On Security of XTR Public Key Cryptosystems Against Side Channel Attacks
  41. Altmetric Badge
    Chapter 40 On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks
  42. Altmetric Badge
    Chapter 41 Fault Attacks on Signature Schemes
Attention for Chapter 25: A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
Altmetric Badge

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
21 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks
Chapter number 25
Book title
Information Security and Privacy
Published by
Springer, Berlin, Heidelberg, July 2004
DOI 10.1007/978-3-540-27800-9_25
Book ISBNs
978-3-54-022379-5, 978-3-54-027800-9
Authors

Chae Hoon Lim, Lim, Chae Hoon

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 21 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 21 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 8 38%
Student > Master 4 19%
Researcher 2 10%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 3 14%
Readers by discipline Count As %
Computer Science 17 81%
Physics and Astronomy 1 5%
Unknown 3 14%