↓ Skip to main content

Information Security and Cryptology - ICISC 2011

Overview of attention for book
Cover of 'Information Security and Cryptology - ICISC 2011'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Improved Integral Analysis on Tweaked Lesamnta
  3. Altmetric Badge
    Chapter 2 Analysis of Trivium Using Compressed Right Hand Side Equations
  4. Altmetric Badge
    Chapter 3 Cryptanalysis of Round-Reduced HAS-160
  5. Altmetric Badge
    Chapter 4 An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software
  6. Altmetric Badge
    Chapter 5 An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks
  7. Altmetric Badge
    Chapter 6 Correcting Errors in Private Keys Obtained from Cold Boot Attacks
  8. Altmetric Badge
    Chapter 7 Strong Security Notions for Timed-Release Public-Key Encryption Revisited
  9. Altmetric Badge
    Chapter 8 Fully Secure Unidirectional Identity-Based Proxy Re-encryption
  10. Altmetric Badge
    Chapter 9 Detecting Parasite P2P Botnet in eMule -like Networks through Quasi-periodicity Recognition
  11. Altmetric Badge
    Chapter 10 AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability
  12. Altmetric Badge
    Chapter 11 Weaknesses in Current RSA Signature Schemes
  13. Altmetric Badge
    Chapter 12 Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations
  14. Altmetric Badge
    Chapter 13 A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users
  15. Altmetric Badge
    Chapter 14 Generic Constructions for Verifiable Signcryption
  16. Altmetric Badge
    Chapter 15 Non-delegatable Strong Designated Verifier Signature on Elliptic Curves
  17. Altmetric Badge
    Chapter 16 An Improved Known Plaintext Attack on PKZIP Encryption Algorithm
  18. Altmetric Badge
    Chapter 17 Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
  19. Altmetric Badge
    Chapter 18 On the Resistance of Boolean Functions against Fast Algebraic Attacks
  20. Altmetric Badge
    Chapter 19 CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
  21. Altmetric Badge
    Chapter 20 Design, Implementation, and Evaluation of a Vehicular Hardware Security Module
  22. Altmetric Badge
    Chapter 21 Information Security and Cryptology - ICISC 2011
  23. Altmetric Badge
    Chapter 22 Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering
  24. Altmetric Badge
    Chapter 23 Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing
  25. Altmetric Badge
    Chapter 24 Biclique Attack on the Full HIGHT
  26. Altmetric Badge
    Chapter 25 Information Security and Cryptology - ICISC 2011
  27. Altmetric Badge
    Chapter 26 Breaking a 3D-Based CAPTCHA Scheme
  28. Altmetric Badge
    Chapter 27 Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
  29. Altmetric Badge
    Chapter 28 Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes
  30. Altmetric Badge
    Chapter 29 A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic
  31. Altmetric Badge
    Chapter 30 On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks
  32. Altmetric Badge
    Chapter 31 Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles
  33. Altmetric Badge
    Chapter 32 Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys
Attention for Chapter 16: An Improved Known Plaintext Attack on PKZIP Encryption Algorithm
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
1 Dimensions

Readers on

mendeley
20 Mendeley
citeulike
1 CiteULike
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm
Chapter number 16
Book title
Information Security and Cryptology - ICISC 2011
Published in
Lecture notes in computer science, November 2011
DOI 10.1007/978-3-642-31912-9_16
Book ISBNs
978-3-64-231911-2, 978-3-64-231912-9
Authors

Kyung Chul Jeong, Dong Hoon Lee, Daewan Han

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 20 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 20 100%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 6 30%
Student > Master 5 25%
Researcher 2 10%
Professor 1 5%
Other 1 5%
Other 2 10%
Unknown 3 15%
Readers by discipline Count As %
Computer Science 16 80%
Physics and Astronomy 1 5%
Unknown 3 15%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 12 August 2014.
All research outputs
#17,700,681
of 22,759,618 outputs
Outputs from Lecture notes in computer science
#5,912
of 8,126 outputs
Outputs of similar age
#190,882
of 239,996 outputs
Outputs of similar age from Lecture notes in computer science
#393
of 508 outputs
Altmetric has tracked 22,759,618 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,126 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 239,996 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 20th percentile – i.e., 20% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 508 others from the same source and published within six weeks on either side of this one. This one is in the 22nd percentile – i.e., 22% of its contemporaries scored the same or lower than it.