Class information for:
Level 1: RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
33726 121 22.9 26%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
2473 2             BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS 3978
33726 1                   RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS 121

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 RC4 authKW 7025923 29% 80% 35
2 QUALITY OF PROTECTION authKW 573540 4% 45% 5
3 DISTINGUISHING ATTACKS authKW 567809 2% 75% 3
4 WEP authKW 567803 5% 38% 6
5 BROADCAST SETTING authKW 504720 2% 100% 2
6 FMS ATTACK authKW 504720 2% 100% 2
7 KEYSTREAM BIASES authKW 504720 2% 100% 2
8 PLAINTEXT RECOVERY ATTACK authKW 504720 2% 100% 2
9 QUALITY OF SECURITY METRICS authKW 504720 2% 100% 2
10 RC4A authKW 504720 2% 100% 2

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 4010 47% 0% 57
2 Computer Science, Hardware & Architecture 2180 24% 0% 29
3 Computer Science, Theory & Methods 1096 26% 0% 32
4 Telecommunications 655 20% 0% 24
5 Computer Science, Software Engineering 537 16% 0% 19
6 Engineering, Electrical & Electronic 323 31% 0% 38
7 Mathematics, Applied 58 10% 0% 12
8 Nuclear Science & Technology 36 6% 0% 7
9 Engineering, General 8 2% 0% 3
10 Medical Informatics 4 1% 0% 1

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMMON SOFTWARE PLATFORM S 252360 1% 100% 1
2 EES SYST 252360 1% 100% 1
3 J AN AIR SELF DEFENCE FORCE 252360 1% 100% 1
4 SERV PROVIDER LINE BUSINES 252360 1% 100% 1
5 TRACING TRACKING SYST 252360 1% 100% 1
6 UNITE RECH REDCAD 252360 1% 100% 1
7 ACMU 126179 1% 50% 1
8 IDRBT 126179 1% 50% 1
9 INDECT PROJECT TEAM 126179 1% 50% 1
10 MPSOC ARCHITECTU 126179 1% 50% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 26211 3% 3% 4
2 COMPUTERS & SECURITY 7603 5% 1% 6
3 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 5361 11% 0% 13
4 DESIGNS CODES AND CRYPTOGRAPHY 3652 4% 0% 5
5 COMPUTER COMMUNICATIONS 3640 7% 0% 8
6 MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE 1194 1% 0% 1
7 JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT 909 1% 0% 1
8 COMPUTER STANDARDS & INTERFACES 809 2% 0% 2
9 IET INFORMATION SECURITY 782 1% 0% 1
10 SECURITY AND COMMUNICATION NETWORKS 725 2% 0% 2

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 RC4 7025923 29% 80% 35 Search RC4 Search RC4
2 QUALITY OF PROTECTION 573540 4% 45% 5 Search QUALITY+OF+PROTECTION Search QUALITY+OF+PROTECTION
3 DISTINGUISHING ATTACKS 567809 2% 75% 3 Search DISTINGUISHING+ATTACKS Search DISTINGUISHING+ATTACKS
4 WEP 567803 5% 38% 6 Search WEP Search WEP
5 BROADCAST SETTING 504720 2% 100% 2 Search BROADCAST+SETTING Search BROADCAST+SETTING
6 FMS ATTACK 504720 2% 100% 2 Search FMS+ATTACK Search FMS+ATTACK
7 KEYSTREAM BIASES 504720 2% 100% 2 Search KEYSTREAM+BIASES Search KEYSTREAM+BIASES
8 PLAINTEXT RECOVERY ATTACK 504720 2% 100% 2 Search PLAINTEXT+RECOVERY+ATTACK Search PLAINTEXT+RECOVERY+ATTACK
9 QUALITY OF SECURITY METRICS 504720 2% 100% 2 Search QUALITY+OF+SECURITY+METRICS Search QUALITY+OF+SECURITY+METRICS
10 RC4A 504720 2% 100% 2 Search RC4A Search RC4A

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 JINDAL, P , SINGH, B , (2017) OPTIMIZATION OF THE SECURITY-PERFORMANCE TRADEOFF IN RC4 ENCRYPTION ALGORITHM.WIRELESS PERSONAL COMMUNICATIONS. VOL. 92. ISSUE 3. P. 1221 -1250 10 91% 0
2 SEN GUPTA, S , MAITRA, S , PAUL, G , SARKAR, S , (2014) (NON-)RANDOM SEQUENCES FROM (NON-)RANDOM PERMUTATIONS-ANALYSIS OF RC4 STREAM CIPHER.JOURNAL OF CRYPTOLOGY. VOL. 27. ISSUE 1. P. 67-108 9 100% 3
3 PAUL, G , MAITRA, S , (2009) ON BIASES OF PERMUTATION AND KEYSTREAM BYTES OF RC4 TOWARDS THE SECRET KEY.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 1. ISSUE 2. P. 225-268 9 100% 2
4 KIRCANSKI, A , AL-ZAIDY, R , YOUSSEF, AM , (2009) A NEW DISTINGUISHING AND KEY RECOVERY ATTACK ON NGG STREAM CIPHER.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 1. ISSUE 2. P. 269-282 9 100% 0
5 SARKAR, S , (2015) FURTHER NON-RANDOMNESS IN RC4, RC4A AND VMPC.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 7. ISSUE 3. P. 317 -330 7 100% 5
6 ITO, R , MIYAJI, A , (2016) REFINED GLIMPSE CORRELATIONS OF RC4.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E99A. ISSUE 1. P. 3 -13 7 100% 0
7 MIYAJI, A , SUKEGAWA, M , (2010) NEW ANALYSIS BASED ON CORRELATIONS OF RC4 PRGA WITH NONZERO-BIT DIFFERENCES.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E93A. ISSUE 6. P. 1066 -1077 7 100% 0
8 MAZUR, K , KSIEZOPOLSKI, B , WIERZBICKI, A , (2015) ON SECURITY MANAGEMENT: IMPROVING ENERGY EFFICIENCY, DECREASING NEGATIVE ENVIRONMENTAL IMPACT, AND REDUCING FINANCIAL COSTS FOR DATA CENTERS.MATHEMATICAL PROBLEMS IN ENGINEERING. VOL. . ISSUE . P. - 8 73% 0
9 TERAMURA, R , OHIGASHI, T , KUWAKADO, H , MORII, M , (2011) GENERALIZED CLASSES OF WEAK KEYS ON RC4 USING PREDICTIVE STATE.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E94A. ISSUE 1. P. 10 -18 6 100% 0
10 OHIGASHI, T , ISOBE, T , WATANABE, Y , MORII, M , (2015) FULL PLAINTEXT RECOVERY ATTACKS ON RC4 USING MULTIPLE BIASES.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E98A. ISSUE 1. P. 81 -91 6 86% 0

Classes with closest relation at Level 1



Rank Class id link
1 13312 SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS
2 10813 BOOLEAN FUNCTIONS//ALGEBRAIC IMMUNITY//STREAM CIPHER
3 7292 BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION
4 36636 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION
5 30618 CRC 32//CYCLIC REDUNDANCY CHECKS//DIGITAL BROADCASTING SYSTEM
6 31079 CAUSAL MAPPINGS//ABSTRACT DIFFERENTIAL DELAY EQUATIONS//ABSTRACT NONLINEAR DIFFERENTIAL DELAY EQUATIONS
7 35300 ACTOR AGENT THEORY//COSMOPOLITAN ALTRUISM//DECENTRALIZED DATABASE
8 35759 DELTA SCAN TOPOGRAMS//AMBIENT INFORMATION INTERFACES//CONTACT TIP ND YAG LASER PHOTOTHERAPY
9 25357 AUTOCONFIGURATION//6LOWPAN//IPV6 ADDRESS
10 30889 CROSSING THE QUALITY CHASM//HILL CLIMB//SUBSTITUTION CIPHER

Go to start page