↓ Skip to main content

Advances in Cryptology — ASIACRYPT 2002

Overview of attention for book
Cover of 'Advances in Cryptology — ASIACRYPT 2002'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Analysis of Bernstein’s Factorization Circuit
  3. Altmetric Badge
    Chapter 2 A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
  4. Altmetric Badge
    Chapter 3 Looking beyond XTR
  5. Altmetric Badge
    Chapter 4 Bounds for Robust Metering Schemes and Their Relationship with A2-code
  6. Altmetric Badge
    Chapter 5 Unconditionally Secure Anonymous Encryption and Group Authentication
  7. Altmetric Badge
    Chapter 6 Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
  8. Altmetric Badge
    Chapter 7 On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
  9. Altmetric Badge
    Chapter 8 A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
  10. Altmetric Badge
    Chapter 9 Efficient Oblivious Transfer in the Bounded-Storage Model
  11. Altmetric Badge
    Chapter 10 In How Many Ways Can You Write Rijndael?
  12. Altmetric Badge
    Chapter 11 On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
  13. Altmetric Badge
    Chapter 12 Threshold Cryptosystems Based on Factoring
  14. Altmetric Badge
    Chapter 13 Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
  15. Altmetric Badge
    Chapter 14 Asynchronous Secure Communication Tolerating Mixed Adversaries
  16. Altmetric Badge
    Chapter 15 Amplified Boomerang Attack against Reduced-Round SHACAL
  17. Altmetric Badge
    Chapter 16 Enhancing Differential-Linear Cryptanalysis
  18. Altmetric Badge
    Chapter 17 Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
  19. Altmetric Badge
    Chapter 18 Analysis of Neural Cryptography
  20. Altmetric Badge
    Chapter 19 The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
  21. Altmetric Badge
    Chapter 20 A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2
  22. Altmetric Badge
    Chapter 21 A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
  23. Altmetric Badge
    Chapter 22 On Unconditionally Secure Robust Distributed Key Distribution Centers
  24. Altmetric Badge
    Chapter 23 Short Signatures in the Random Oracle Model
  25. Altmetric Badge
    Chapter 24 The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
  26. Altmetric Badge
    Chapter 25 Transitive Signatures Based on Factoring and RSA
  27. Altmetric Badge
    Chapter 26 1-out-of-n Signatures from a Variety of Keys
  28. Altmetric Badge
    Chapter 27 A Revocation Scheme with Minimal Storage at Receivers
  29. Altmetric Badge
    Chapter 28 Optimistic Mixing for Exit-Polls
  30. Altmetric Badge
    Chapter 29 Improved Construction of Nonlinear Resilient S-Boxes
  31. Altmetric Badge
    Chapter 30 An Upper Bound on the Number of m-Resilient Boolean Functions
  32. Altmetric Badge
    Chapter 31 Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
  33. Altmetric Badge
    Chapter 32 Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
  34. Altmetric Badge
    Chapter 33 ID-Based Blind Signature and Ring Signature from Pairings
  35. Altmetric Badge
    Chapter 34 Hierarchical ID-Based Cryptography
  36. Altmetric Badge
    Chapter 35 Crypto-integrity
  37. Altmetric Badge
    Chapter 36 Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis
Attention for Chapter 14: Asynchronous Secure Communication Tolerating Mixed Adversaries
Altmetric Badge

Citations

dimensions_citation
15 Dimensions

Readers on

mendeley
37 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Asynchronous Secure Communication Tolerating Mixed Adversaries
Chapter number 14
Book title
Advances in Cryptology — ASIACRYPT 2002
Published in
Lecture notes in computer science, November 2002
DOI 10.1007/3-540-36178-2_14
Book ISBNs
978-3-54-000171-3, 978-3-54-036178-7
Authors

K. Srinathan, M. V. N. Ashwin Kumar, C. Pandu Rangan

Editors

Yuliang Zheng

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 37 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
India 1 3%
Unknown 36 97%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 13 35%
Student > Master 8 22%
Researcher 3 8%
Professor 2 5%
Student > Postgraduate 2 5%
Other 7 19%
Unknown 2 5%
Readers by discipline Count As %
Computer Science 26 70%
Mathematics 3 8%
Physics and Astronomy 2 5%
Business, Management and Accounting 1 3%
Engineering 1 3%
Other 1 3%
Unknown 3 8%