Class information for:
Level 1: MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM//MULTIVARIATE CRYPTOGRAPHY//SFLASH

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
21991 398 20.4 30%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
1707 2             JOURNAL OF SYMBOLIC COMPUTATION//SCALAR MULTIPLICATION//FINITE FIELDS 6697
21991 1                   MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM//MULTIVARIATE CRYPTOGRAPHY//SFLASH 398

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM authKW 1231799 4% 94% 17
2 MULTIVARIATE CRYPTOGRAPHY authKW 864389 3% 87% 13
3 SFLASH authKW 460327 2% 100% 6
4 F 5 ALGORITHM authKW 446373 2% 73% 8
5 GROBNER BASES authKW 442544 11% 13% 45
6 MQ PROBLEM authKW 409174 2% 67% 8
7 HIDDEN FIELD EQUATION authKW 383606 1% 100% 5
8 DIFFERENCE DIFFERENTIAL MODULE authKW 306885 1% 100% 4
9 ISOMORPHISM OF POLYNOMIALS authKW 306885 1% 100% 4
10 MULTIVARIATE PUBLIC KEY CRYPTOGRAPHY authKW 306885 1% 100% 4

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Theory & Methods 9839 43% 0% 172
2 Mathematics, Applied 3393 37% 0% 147
3 Computer Science, Software Engineering 1513 15% 0% 58
4 Mathematics 772 20% 0% 80
5 Computer Science, Information Systems 761 12% 0% 47
6 Computer Science, Hardware & Architecture 457 6% 0% 25
7 Computer Science, Interdisciplinary Applications 266 8% 0% 30
8 Physics, Mathematical 66 4% 0% 17
9 Engineering, Electrical & Electronic 27 8% 0% 30
10 Telecommunications 15 2% 0% 9

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CRYPTO CP8 175359 1% 57% 4
2 AG MADLENER 76721 0% 100% 1
3 ALGORITHMEN KOGNITIVE SYSTEME 76721 0% 100% 1
4 CNRSUFR INGN 919UMR 7606LIP6 76721 0% 100% 1
5 EQUIPE COMBINATOIRE ALGORITHMES 76721 0% 100% 1
6 EQUIPE POLSVS 76721 0% 100% 1
7 HBEREICH INFORNAT 76721 0% 100% 1
8 INRI OLSYS PROJECTUMR 7606 76721 0% 100% 1
9 LEHHSTUHL B MATH 76721 0% 100% 1
10 LEHRSTUHL MATHEMAT B 76721 0% 100% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 PROGRAMMING AND COMPUTER SOFTWARE 107830 9% 4% 34
2 JOURNAL OF SYMBOLIC COMPUTATION 106728 14% 2% 56
3 APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 12620 3% 2% 10
4 DESIGNS CODES AND CRYPTOGRAPHY 5366 3% 1% 11
5 LECTURE NOTES IN COMPUTER SCIENCE 5217 20% 0% 78
6 JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY 3390 2% 1% 6
7 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 3104 5% 0% 18
8 FINITE FIELDS AND THEIR APPLICATIONS 2696 2% 1% 6
9 SCIENCE CHINA-MATHEMATICS 1992 2% 0% 6
10 APPLIED AND COMPUTATIONAL MATHEMATICS 1137 1% 1% 2

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM 1231799 4% 94% 17 Search MULTIVARIATE+PUBLIC+KEY+CRYPTOSYSTEM Search MULTIVARIATE+PUBLIC+KEY+CRYPTOSYSTEM
2 MULTIVARIATE CRYPTOGRAPHY 864389 3% 87% 13 Search MULTIVARIATE+CRYPTOGRAPHY Search MULTIVARIATE+CRYPTOGRAPHY
3 SFLASH 460327 2% 100% 6 Search SFLASH Search SFLASH
4 F 5 ALGORITHM 446373 2% 73% 8 Search F+5+ALGORITHM Search F+5+ALGORITHM
5 GROBNER BASES 442544 11% 13% 45 Search GROBNER+BASES Search GROBNER+BASES
6 MQ PROBLEM 409174 2% 67% 8 Search MQ+PROBLEM Search MQ+PROBLEM
7 HIDDEN FIELD EQUATION 383606 1% 100% 5 Search HIDDEN+FIELD+EQUATION Search HIDDEN+FIELD+EQUATION
8 DIFFERENCE DIFFERENTIAL MODULE 306885 1% 100% 4 Search DIFFERENCE+DIFFERENTIAL+MODULE Search DIFFERENCE+DIFFERENTIAL+MODULE
9 ISOMORPHISM OF POLYNOMIALS 306885 1% 100% 4 Search ISOMORPHISM+OF+POLYNOMIALS Search ISOMORPHISM+OF+POLYNOMIALS
10 MULTIVARIATE PUBLIC KEY CRYPTOGRAPHY 306885 1% 100% 4 Search MULTIVARIATE+PUBLIC+KEY+CRYPTOGRAPHY Search MULTIVARIATE+PUBLIC+KEY+CRYPTOGRAPHY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 WANG, LC , YANG, BY , HU, YH , LAI, FP , (2006) A "MEDIUM-FIELD" MULTIVARIATE PUBLIC-KEY ENCRYPTION SCHEME.TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS. VOL. 3860. ISSUE . P. 132 -149 23 96% 20
2 HASHIMOTO, Y , TAKAGI, T , SAKURAI, K , (2013) GENERAL FAULT ATTACKS ON MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMS.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E96A. ISSUE 1. P. 196 -205 20 80% 1
3 NIE, XY , PETZOLDT, A , BUCHMANN, J , LI, FG , (2014) LINEARIZATION EQUATION ATTACK ON 2-LAYER NONLINEAR PIECE IN HAND METHOD.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E97A. ISSUE 9. P. 1952 -1961 15 100% 0
4 HASHIMOTO, Y , (2016) CRYPTANALYSIS OF THE MULTIVARIATE SIGNATURE SCHEME PROPOSED IN PQCRYPTO 2013.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E99A. ISSUE 1. P. 58 -65 13 100% 0
5 ZHAO, X , FENG, D , (2010) BYPASSING THE DECOMPOSITION ATTACKS ON TWO-ROUND MULTIVARIATE SCHEMES BY A PRACTICAL CUBIC ROUND.IET INFORMATION SECURITY. VOL. 4. ISSUE 3. P. 167 -184 21 70% 1
6 EDER, C , FAUGERE, JC , (2017) A SURVEY ON SIGNATURE-BASED ALGORITHMS FOR COMPUTING GROBNER BASES.JOURNAL OF SYMBOLIC COMPUTATION. VOL. 80. ISSUE . P. 719 -784 18 67% 0
7 GOTAISHI, M , TADAKI, K , FUJITA, R , TSUJII, S , (2010) DUALLY-PERTURBED MATSUMOTO-IMAI SIGNATURE (DPMS) SCHEME.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E93A. ISSUE 6. P. 1078 -1085 12 100% 0
8 HU, YH , CHOU, CY , WANG, LC , LAI, F , (2006) CRYPTANALYSIS OF VARIANTS OF UOV.INFORMATION SECURITY, PROCEEDINGS. VOL. 4176. ISSUE . P. 161-170 12 100% 1
9 TSUJII, S , TADAKI, K , FUJITA, R , GOTAISHI, M , KANEKO, T , (2009) SECURITY ENHANCEMENT OF VARIOUS MPKCS BY 2-LAYER NONLINEAR PIECE IN HAND METHOD.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E92A. ISSUE 10. P. 2438 -2446 11 100% 2
10 SUN, Y , HUANG, ZY , WANG, DK , LIN, DD , (2016) AN IMPROVEMENT OVER THE GVW ALGORITHM FOR INHOMOGENEOUS POLYNOMIAL SYSTEMS.FINITE FIELDS AND THEIR APPLICATIONS. VOL. 41. ISSUE . P. 174 -192 10 91% 0

Classes with closest relation at Level 1



Rank Class id link
1 6132 JOURNAL OF SYMBOLIC COMPUTATION//POLYNOMIAL SYSTEM SOLVING//MATEMAT ESTADIST COMPUTAC
2 10813 BOOLEAN FUNCTIONS//ALGEBRAIC IMMUNITY//STREAM CIPHER
3 21638 IDEAL PROJECTOR//KERGIN INTERPOLATION//RADON PROJECTIONS
4 35606 LOGIC AND SYMBOLIC COMPUTING//RAILWAY INTERLOCKINGS//O ALGEBRA
5 33491 SELF FORMATION PROCESSES//ACTIVITIES AND CAPABILITIES//ADAPTIVE POWER MODELING
6 25983 GLOBAL EMBEDDING//PROLONGATION STRUCTURE//COVARIANT PROLONGATION STRUCTURE
7 21228 SYMBOLIC SUMMATION//SYMBOL COMPUTAT//BOROS MOLL POLYNOMIALS
8 6123 NONCOMMUTATIVE PROJECTIVE GEOMETRY//ARTIN SCHELTER REGULAR ALGEBRA//QUANTUM MATRICES
9 35134 SUBLIMINAL CHANNEL//KEY ESCROW//HBEREICH ANGEW INFORMAT
10 12167 GROBNER SHIRSHOV BASIS//QUASI SYMMETRIC FUNCTIONS//ROTA BAXTER ALGEBRA

Go to start page