Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
31672 | 149 | 19.1 | 33% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
1044 | 2 | NETWORK CODING//LOW DENSITY PARITY CHECK LDPC CODES//ITERATIVE DECODING | 10120 |
31672 | 1 | MCELIECE CRYPTOSYSTEM//MCELIECE//GOPPA CODES | 149 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | MCELIECE CRYPTOSYSTEM | authKW | 2308947 | 9% | 87% | 13 |
2 | MCELIECE | authKW | 1255234 | 5% | 88% | 7 |
3 | GOPPA CODES | authKW | 1116228 | 11% | 34% | 16 |
4 | CODE BASED CRYPTOGRAPHY | authKW | 1008912 | 5% | 62% | 8 |
5 | COLUMN SCRAMBLER | authKW | 614809 | 2% | 100% | 3 |
6 | GPT CRYPTOSYSTEM | authKW | 614809 | 2% | 100% | 3 |
7 | MCELIECE PUBLIC KEY CRYPTOSYSTEM | authKW | 614809 | 2% | 100% | 3 |
8 | SECRET PROJECT | address | 614809 | 2% | 100% | 3 |
9 | RANK DISTANCE CODES | authKW | 546494 | 3% | 67% | 4 |
10 | CRYPTOG COMP ALGEBRA GRP | address | 461105 | 2% | 75% | 3 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 2874 | 38% | 0% | 57 |
2 | Computer Science, Information Systems | 1821 | 29% | 0% | 43 |
3 | Engineering, Electrical & Electronic | 685 | 40% | 0% | 60 |
4 | Computer Science, Hardware & Architecture | 340 | 9% | 0% | 13 |
5 | Mathematics, Applied | 280 | 18% | 0% | 27 |
6 | Telecommunications | 142 | 9% | 0% | 13 |
7 | Computer Science, Software Engineering | 110 | 7% | 0% | 10 |
8 | COMPUTER APPLICATIONS & CYBERNETICS | 76 | 1% | 0% | 1 |
9 | Mathematics | 8 | 5% | 0% | 7 |
10 | Physics, Mathematical | 1 | 1% | 0% | 2 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECRET PROJECT | 614809 | 2% | 100% | 3 |
2 | CRYPTOG COMP ALGEBRA GRP | 461105 | 2% | 75% | 3 |
3 | GK ELECT COMMERCE | 409873 | 1% | 100% | 2 |
4 | GRP RECH INFORMAT MATH | 409873 | 1% | 100% | 2 |
5 | TECHNOL INFORMAT SECUR | 368883 | 2% | 60% | 3 |
6 | GRACE PROJECT | 273247 | 1% | 67% | 2 |
7 | COSIC SCD ESAT | 204936 | 1% | 100% | 1 |
8 | CRYTOG COMP ALGEBRA GRP | 204936 | 1% | 100% | 1 |
9 | ERGUNLER CO RD | 204936 | 1% | 100% | 1 |
10 | FG ESA | 204936 | 1% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DESIGNS CODES AND CRYPTOGRAPHY | 23285 | 9% | 1% | 14 |
2 | IEEE TRANSACTIONS ON INFORMATION THEORY | 11621 | 15% | 0% | 23 |
3 | IET COMMUNICATIONS | 2795 | 4% | 0% | 6 |
4 | PROBLEMS OF INFORMATION TRANSMISSION | 2794 | 1% | 1% | 2 |
5 | IET INFORMATION SECURITY | 2542 | 1% | 1% | 2 |
6 | LECTURE NOTES IN COMPUTER SCIENCE | 1926 | 19% | 0% | 29 |
7 | JOURNAL OF CRYPTOLOGY | 1863 | 1% | 0% | 2 |
8 | PROBLEMS OF CONTROL AND INFORMATION THEORY-PROBLEMY UPRAVLENIYA I TEORII INFORMATSII | 1255 | 1% | 1% | 1 |
9 | IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES | 1200 | 1% | 0% | 2 |
10 | ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS | 1182 | 1% | 0% | 2 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | MCELIECE CRYPTOSYSTEM | 2308947 | 9% | 87% | 13 | Search MCELIECE+CRYPTOSYSTEM | Search MCELIECE+CRYPTOSYSTEM |
2 | MCELIECE | 1255234 | 5% | 88% | 7 | Search MCELIECE | Search MCELIECE |
3 | GOPPA CODES | 1116228 | 11% | 34% | 16 | Search GOPPA+CODES | Search GOPPA+CODES |
4 | CODE BASED CRYPTOGRAPHY | 1008912 | 5% | 62% | 8 | Search CODE+BASED+CRYPTOGRAPHY | Search CODE+BASED+CRYPTOGRAPHY |
5 | COLUMN SCRAMBLER | 614809 | 2% | 100% | 3 | Search COLUMN+SCRAMBLER | Search COLUMN+SCRAMBLER |
6 | GPT CRYPTOSYSTEM | 614809 | 2% | 100% | 3 | Search GPT+CRYPTOSYSTEM | Search GPT+CRYPTOSYSTEM |
7 | MCELIECE PUBLIC KEY CRYPTOSYSTEM | 614809 | 2% | 100% | 3 | Search MCELIECE+PUBLIC+KEY+CRYPTOSYSTEM | Search MCELIECE+PUBLIC+KEY+CRYPTOSYSTEM |
8 | RANK DISTANCE CODES | 546494 | 3% | 67% | 4 | Search RANK+DISTANCE+CODES | Search RANK+DISTANCE+CODES |
9 | GOPPA | 461105 | 2% | 75% | 3 | Search GOPPA | Search GOPPA |
10 | NIEDERREITER CRYPTOSYSTEM | 461105 | 2% | 75% | 3 | Search NIEDERREITER+CRYPTOSYSTEM | Search NIEDERREITER+CRYPTOSYSTEM |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | BALDI, M , BIANCHI, M , CHIARALUCE, F , ROSENTHAL, J , SCHIPANI, D , (2016) ENHANCED PUBLIC KEY SECURITY FOR THE MCELIECE CRYPTOSYSTEM.JOURNAL OF CRYPTOLOGY. VOL. 29. ISSUE 1. P. 1 -27 | 9 | 90% | 1 |
2 | ESMAEILI, M , GULLIVER, TA , (2016) A SECURE CODE BASED CRYPTOSYSTEM VIA RANDOM INSERTIONS, DELETIONS, AND ERRORS.IEEE COMMUNICATIONS LETTERS. VOL. 20. ISSUE 5. P. 870 -873 | 7 | 100% | 0 |
3 | COUVREUR, A , OTMANI, A , TILLICH, JP , (2017) POLYNOMIAL TIME ATTACK ON WILD MCELIECE OVER QUADRATIC EXTENSIONS.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 63. ISSUE 1. P. 404 -427 | 9 | 75% | 0 |
4 | ILANTHENRAL, K , EASWARAKUMAR, KS , (2014) HEXI MCELIECE PUBLIC KEY CRYPTOSYSTEM.APPLIED MATHEMATICS & INFORMATION SCIENCES. VOL. 8. ISSUE 5. P. 2595 -2603 | 6 | 100% | 0 |
5 | FAUGERE, JC , OTMANI, A , PERRET, L , DE PORTZAMPARC, F , TILLICH, JP , (2016) STRUCTURAL CRYPTANALYSIS OF MCELIECE SCHEMES WITH COMPACT KEYS.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 79. ISSUE 1. P. 87 -112 | 7 | 78% | 0 |
6 | OVERBECK, R , (2008) STRUCTURAL ATTACKS FOR PUBLIC KEY CRYPTOSYSTEMS BASED ON GABIDULIN CODES.JOURNAL OF CRYPTOLOGY. VOL. 21. ISSUE 2. P. 280 -301 | 6 | 100% | 22 |
7 | TOMLINSON, M , BEZZATEEV, SV , JIBRIL, M , AMBROZE, MA , AHMED, MZ , (2015) USING THE STRUCTURE OF SUBFIELDS IN THE CONSTRUCTION OF GOPPA CODES AND EXTENDED GOPPA CODES.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 61. ISSUE 6. P. 3214 -3224 | 8 | 67% | 0 |
8 | HOOSHMAND, R , AREF, MR , (2016) EFFICIENT SECURE CHANNEL CODING SCHEME BASED ON LOW-DENSITY LATTICE CODES.IET COMMUNICATIONS. VOL. 10. ISSUE 11. P. 1365 -1373 | 7 | 70% | 0 |
9 | SUN, HM , (2002) IMPROVING THE INFORMATION RATE OF A PRIVATE-KEY CRYPTOSYSTEM BASED ON PRODUCT CODES.INFORMATICA. VOL. 13. ISSUE 1. P. 105 -110 | 7 | 100% | 0 |
10 | FAUGERE, JC , OTMANI, A , PERRET, L , DE PORTZAMPARC, F , TILLICH, JP , (2016) FOLDING ALTERNANT AND GOPPA CODES WITH NON-TRIVIAL AUTOMORPHISM GROUPS.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 62. ISSUE 1. P. 184 -198 | 5 | 71% | 3 |
Classes with closest relation at Level 1 |