Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
7458 | 1286 | 19.2 | 32% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
1719 | 6083 | BLOCK CIPHER//ALGEBRAIC IMMUNITY//CRYPTOGRAPHY |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | BLOCK CIPHER | Author keyword | 75 | 36% | 13% | 167 |
2 | DIFFERENTIAL CRYPTANALYSIS | Author keyword | 40 | 45% | 5% | 66 |
3 | BLOCK CIPHERS | Author keyword | 32 | 34% | 6% | 77 |
4 | LINEAR CRYPTANALYSIS | Author keyword | 26 | 42% | 4% | 47 |
5 | HIGHER ORDER DIFFERENTIAL ATTACK | Author keyword | 15 | 82% | 1% | 9 |
6 | CIST | Address | 12 | 22% | 4% | 48 |
7 | ACTIVE S BOXES | Author keyword | 12 | 86% | 0% | 6 |
8 | IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS | Author keyword | 12 | 54% | 1% | 15 |
9 | JOURNAL OF CRYPTOLOGY | Journal | 11 | 16% | 5% | 62 |
10 | UOWHF | Author keyword | 11 | 100% | 0% | 6 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | BLOCK CIPHER | 75 | 36% | 13% | 167 | Search BLOCK+CIPHER | Search BLOCK+CIPHER |
2 | DIFFERENTIAL CRYPTANALYSIS | 40 | 45% | 5% | 66 | Search DIFFERENTIAL+CRYPTANALYSIS | Search DIFFERENTIAL+CRYPTANALYSIS |
3 | BLOCK CIPHERS | 32 | 34% | 6% | 77 | Search BLOCK+CIPHERS | Search BLOCK+CIPHERS |
4 | LINEAR CRYPTANALYSIS | 26 | 42% | 4% | 47 | Search LINEAR+CRYPTANALYSIS | Search LINEAR+CRYPTANALYSIS |
5 | HIGHER ORDER DIFFERENTIAL ATTACK | 15 | 82% | 1% | 9 | Search HIGHER+ORDER+DIFFERENTIAL+ATTACK | Search HIGHER+ORDER+DIFFERENTIAL+ATTACK |
6 | ACTIVE S BOXES | 12 | 86% | 0% | 6 | Search ACTIVE+S+BOXES | Search ACTIVE+S+BOXES |
7 | IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS | 12 | 54% | 1% | 15 | Search IMPOSSIBLE+DIFFERENTIAL+CRYPTANALYSIS | Search IMPOSSIBLE+DIFFERENTIAL+CRYPTANALYSIS |
8 | UOWHF | 11 | 100% | 0% | 6 | Search UOWHF | Search UOWHF |
9 | MODES OF OPERATION | 11 | 37% | 2% | 23 | Search MODES+OF+OPERATION | Search MODES+OF+OPERATION |
10 | FEISTEL CIPHER | 11 | 78% | 1% | 7 | Search FEISTEL+CIPHER | Search FEISTEL+CIPHER |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | SPECTR H64 | 23 | 86% | 1% | 12 |
2 | CRYPTANALYSIS | 18 | 12% | 11% | 142 |
3 | HASH FUNCTIONS | 17 | 21% | 6% | 71 |
4 | PSEUDORANDOM PERMUTATIONS | 16 | 44% | 2% | 28 |
5 | CIKS 1 | 15 | 88% | 1% | 7 |
6 | DIFFERENTIAL CRYPTANALYSIS | 11 | 45% | 1% | 19 |
7 | RC5 | 11 | 78% | 1% | 7 |
8 | BLOCK CIPHER | 10 | 26% | 3% | 34 |
9 | MESSAGE AUTHENTICATION | 10 | 40% | 1% | 19 |
10 | BLOCK CIPHERS | 10 | 28% | 2% | 30 |
Journals |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | JOURNAL OF CRYPTOLOGY | 11 | 16% | 5% | 62 |
2 | CRYPTOLOGIA | 4 | 16% | 2% | 21 |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
Survey and Benchmark of Block Ciphers for Wireless Sensor Networks | 2006 | 5 | 23 | 65% |
Cryptographic primitives for information authentication - State of the art | 1998 | 8 | 46 | 72% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | CIST | 12 | 22% | 3.7% | 48 |
2 | ESAT COSIC | 10 | 44% | 1.3% | 17 |
3 | COSIC | 8 | 26% | 2.2% | 28 |
4 | ELECT ENGN ESAT COSIC | 6 | 80% | 0.3% | 4 |
5 | INFORMAT SECUR TECHNOL | 5 | 19% | 1.9% | 24 |
6 | NTT SECURE PLATFORM S | 5 | 30% | 1.0% | 13 |
7 | IAIK | 4 | 38% | 0.7% | 9 |
8 | ESAT SCD COSIC | 4 | 35% | 0.7% | 9 |
9 | INFORMAT SECUR GRP | 4 | 12% | 2.3% | 29 |
10 | COMP INFORMAT MATH | 3 | 100% | 0.2% | 3 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000183900 | ALGEBRAIC IMMUNITY//ALGEBRAIC DEGREE//BOOLEAN FUNCTION |
2 | 0.0000162068 | SIDE CHANNEL ATTACKS//DIFFERENTIAL POWER ANALYSIS DPA//ADVANCED ENCRYPTION STANDARD AES |
3 | 0.0000080261 | SELF FORMATION PROCESSES//HPC FOR COMMERCIAL APPLICATION//DISK FORENSICS |
4 | 0.0000064103 | RANDOM ORACLE MODEL//PROXY SIGNATURE//DIGITAL SIGNATURE |
5 | 0.0000055454 | MATH INF//ORBIT OF SUBSPACES//AUTHENTICATION CODE |
6 | 0.0000051167 | CUCKOO HASHING//WORST CASE SEARCH TIME//MINIMAL PERFECT HASHING |
7 | 0.0000047163 | DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//CARE DEV |
8 | 0.0000037458 | INTELLECTUAL PROPERTY PROTECTION IPP//HARDWARE METERING//HARDWARE SECURITY |
9 | 0.0000037160 | DIRECTED HYPERGRAPHS//SUBSET GRAPH//SET THEORETIC ALGORITHMS |
10 | 0.0000036929 | IMAGE ENCRYPTION//CHOSEN PLAINTEXT ATTACK//KNOWN PLAINTEXT ATTACK |