Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
13312 | 846 | 22.4 | 32% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
2473 | 2 | BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS | 3978 |
13312 | 1 | SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS | 846 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | SIDE CHANNEL ATTACKS | authKW | 1921422 | 14% | 44% | 121 |
2 | ADVANCED ENCRYPTION STANDARD AES | authKW | 809978 | 4% | 61% | 37 |
3 | SIDE CHANNEL ANALYSIS | authKW | 683950 | 4% | 56% | 34 |
4 | DIFFERENTIAL POWER ANALYSIS | authKW | 649638 | 4% | 60% | 30 |
5 | DIFFERENTIAL POWER ANALYSIS DPA | authKW | 629963 | 3% | 73% | 24 |
6 | FAULT ATTACKS | authKW | 623851 | 4% | 52% | 33 |
7 | DIFFERENTIAL FAULT ANALYSIS | authKW | 620441 | 2% | 90% | 19 |
8 | ADVANCED ENCRYPTION STANDARD | authKW | 523890 | 4% | 48% | 30 |
9 | DPA | authKW | 352060 | 5% | 24% | 40 |
10 | AES | authKW | 350329 | 13% | 9% | 108 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Hardware & Architecture | 53618 | 45% | 0% | 378 |
2 | Computer Science, Theory & Methods | 15340 | 37% | 0% | 314 |
3 | Computer Science, Information Systems | 6313 | 23% | 0% | 192 |
4 | Engineering, Electrical & Electronic | 6152 | 50% | 0% | 422 |
5 | Computer Science, Software Engineering | 3254 | 15% | 0% | 124 |
6 | Telecommunications | 1152 | 10% | 0% | 87 |
7 | Computer Science, Interdisciplinary Applications | 133 | 4% | 0% | 34 |
8 | Computer Science, Artificial Intelligence | 19 | 2% | 0% | 16 |
9 | Mathematics, Applied | 17 | 3% | 0% | 27 |
10 | Engineering, General | 6 | 1% | 0% | 10 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | PL INFORMAT PROC COMMUN | 241259 | 2% | 35% | 19 |
2 | UCL CRYPTO GRP | 185604 | 1% | 43% | 12 |
3 | HORST GORTZ IT SECUR | 159281 | 2% | 28% | 16 |
4 | IAIK | 121800 | 1% | 38% | 9 |
5 | STATE AIS TC | 115494 | 0% | 80% | 4 |
6 | ELECT MICROELECT EEL | 72185 | 0% | 100% | 2 |
7 | KAMAKURA OFF | 72185 | 0% | 100% | 2 |
8 | PL INFORMAT PROC COMMUN IAIK | 64444 | 1% | 36% | 5 |
9 | CRYPTO GRP | 58455 | 1% | 18% | 9 |
10 | DSIPTM S | 48122 | 0% | 67% | 2 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | IET INFORMATION SECURITY | 18918 | 2% | 4% | 13 |
2 | LECTURE NOTES IN COMPUTER SCIENCE | 15408 | 23% | 0% | 195 |
3 | MICROPROCESSORS AND MICROSYSTEMS | 15034 | 3% | 2% | 27 |
4 | ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS | 13517 | 1% | 4% | 9 |
5 | IEEE TRANSACTIONS ON COMPUTERS | 10572 | 5% | 1% | 39 |
6 | JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS | 9096 | 2% | 1% | 21 |
7 | IET COMPUTERS AND DIGITAL TECHNIQUES | 8316 | 1% | 2% | 10 |
8 | IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS | 8314 | 3% | 1% | 28 |
9 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 7484 | 1% | 2% | 10 |
10 | ETRI JOURNAL | 7205 | 2% | 1% | 19 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | SIDE CHANNEL ATTACKS | 1921422 | 14% | 44% | 121 | Search SIDE+CHANNEL+ATTACKS | Search SIDE+CHANNEL+ATTACKS |
2 | ADVANCED ENCRYPTION STANDARD AES | 809978 | 4% | 61% | 37 | Search ADVANCED+ENCRYPTION+STANDARD+AES | Search ADVANCED+ENCRYPTION+STANDARD+AES |
3 | SIDE CHANNEL ANALYSIS | 683950 | 4% | 56% | 34 | Search SIDE+CHANNEL+ANALYSIS | Search SIDE+CHANNEL+ANALYSIS |
4 | DIFFERENTIAL POWER ANALYSIS | 649638 | 4% | 60% | 30 | Search DIFFERENTIAL+POWER+ANALYSIS | Search DIFFERENTIAL+POWER+ANALYSIS |
5 | DIFFERENTIAL POWER ANALYSIS DPA | 629963 | 3% | 73% | 24 | Search DIFFERENTIAL+POWER+ANALYSIS+DPA | Search DIFFERENTIAL+POWER+ANALYSIS+DPA |
6 | FAULT ATTACKS | 623851 | 4% | 52% | 33 | Search FAULT+ATTACKS | Search FAULT+ATTACKS |
7 | DIFFERENTIAL FAULT ANALYSIS | 620441 | 2% | 90% | 19 | Search DIFFERENTIAL+FAULT+ANALYSIS | Search DIFFERENTIAL+FAULT+ANALYSIS |
8 | ADVANCED ENCRYPTION STANDARD | 523890 | 4% | 48% | 30 | Search ADVANCED+ENCRYPTION+STANDARD | Search ADVANCED+ENCRYPTION+STANDARD |
9 | DPA | 352060 | 5% | 24% | 40 | Search DPA | Search DPA |
10 | AES | 350329 | 13% | 9% | 108 | Search AES | Search AES |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | KUNDI, DS , AZIZ, A , IKRAM, N , (2016) A HIGH PERFORMANCE ST-BOX BASED UNIFIED AES ENCRYPTION/DECRYPTION ARCHITECTURE ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 41. ISSUE . P. 37 -46 | 25 | 96% | 1 |
2 | TENA-SANCHEZ, E , CASTRO, J , ACOSTA, AJ , (2014) A METHODOLOGY FOR OPTIMIZED DESIGN OF SECURE DIFFERENTIAL LOGIC GATES FOR DPA RESISTANT CIRCUITS.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 203 -215 | 26 | 93% | 1 |
3 | SOLTANI, A , SHARIFIAN, S , (2015) AN ULTRA-HIGH THROUGHPUT AND FULLY PIPELINED IMPLEMENTATION OF AES ALGORITHM ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 39. ISSUE 7. P. 480 -493 | 20 | 100% | 3 |
4 | NIKOVA, S , RIJMEN, V , SCHLAFFER, M , (2011) SECURE HARDWARE IMPLEMENTATION OF NONLINEAR FUNCTIONS IN THE PRESENCE OF GLITCHES.JOURNAL OF CRYPTOLOGY. VOL. 24. ISSUE 2. P. 292 -321 | 18 | 100% | 38 |
5 | KIM, CK , SCHLAFFER, M , MOON, SJ , (2008) DIFFERENTIAL SIDE CHANNEL ANALYSIS ATTACKS ON FPGA IMPLEMENTATIONS OF ARIA.ETRI JOURNAL. VOL. 30. ISSUE 2. P. 315 -325 | 17 | 94% | 14 |
6 | MORADI, A , SALMASIZADEH, M , SHALMANI, MTM , EISENBARTH, T , (2009) VULNERABILITY MODELING OF CRYPTOGRAPHIC HARDWARE TO POWER ANALYSIS ATTACKS.INTEGRATION-THE VLSI JOURNAL. VOL. 42. ISSUE 4. P. 468 -478 | 16 | 100% | 2 |
7 | PIRET, G , STANDAERT, FX , (2008) SECURITY ANALYSIS OF HIGHER-ORDER BOOLEAN MASKING SCHEMES FOR BLOCK CIPHERS (WITH CONDITIONS OF PERFECT MASKING).IET INFORMATION SECURITY. VOL. 2. ISSUE 1. P. 1 -11 | 16 | 100% | 2 |
8 | WANG, Y , HA, YJ , (2014) A PERFORMANCE AND AREA EFFICIENT ASIP FOR HIGHER-ORDER DPA-RESISTANT AES.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 190 -202 | 15 | 88% | 3 |
9 | KIM, CH , (2012) IMPROVED DIFFERENTIAL FAULT ANALYSIS ON AES KEY SCHEDULE.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 7. ISSUE 1. P. 41-50 | 13 | 100% | 12 |
10 | SUGAWARA, T , SATOH, A , HOMMA, N , AOKI, T , (2011) HIGH-PERFORMANCE ARCHITECTURE FOR CONCURRENT ERROR DETECTION FOR AES PROCESSORS.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E94A. ISSUE 10. P. 1971 -1980 | 14 | 100% | 0 |
Classes with closest relation at Level 1 |