Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
33726 | 121 | 22.9 | 26% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
2473 | 2 | BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS | 3978 |
33726 | 1 | RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS | 121 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | RC4 | authKW | 7025923 | 29% | 80% | 35 |
2 | QUALITY OF PROTECTION | authKW | 573540 | 4% | 45% | 5 |
3 | DISTINGUISHING ATTACKS | authKW | 567809 | 2% | 75% | 3 |
4 | WEP | authKW | 567803 | 5% | 38% | 6 |
5 | BROADCAST SETTING | authKW | 504720 | 2% | 100% | 2 |
6 | FMS ATTACK | authKW | 504720 | 2% | 100% | 2 |
7 | KEYSTREAM BIASES | authKW | 504720 | 2% | 100% | 2 |
8 | PLAINTEXT RECOVERY ATTACK | authKW | 504720 | 2% | 100% | 2 |
9 | QUALITY OF SECURITY METRICS | authKW | 504720 | 2% | 100% | 2 |
10 | RC4A | authKW | 504720 | 2% | 100% | 2 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 4010 | 47% | 0% | 57 |
2 | Computer Science, Hardware & Architecture | 2180 | 24% | 0% | 29 |
3 | Computer Science, Theory & Methods | 1096 | 26% | 0% | 32 |
4 | Telecommunications | 655 | 20% | 0% | 24 |
5 | Computer Science, Software Engineering | 537 | 16% | 0% | 19 |
6 | Engineering, Electrical & Electronic | 323 | 31% | 0% | 38 |
7 | Mathematics, Applied | 58 | 10% | 0% | 12 |
8 | Nuclear Science & Technology | 36 | 6% | 0% | 7 |
9 | Engineering, General | 8 | 2% | 0% | 3 |
10 | Medical Informatics | 4 | 1% | 0% | 1 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMMON SOFTWARE PLATFORM S | 252360 | 1% | 100% | 1 |
2 | EES SYST | 252360 | 1% | 100% | 1 |
3 | J AN AIR SELF DEFENCE FORCE | 252360 | 1% | 100% | 1 |
4 | SERV PROVIDER LINE BUSINES | 252360 | 1% | 100% | 1 |
5 | TRACING TRACKING SYST | 252360 | 1% | 100% | 1 |
6 | UNITE RECH REDCAD | 252360 | 1% | 100% | 1 |
7 | ACMU | 126179 | 1% | 50% | 1 |
8 | IDRBT | 126179 | 1% | 50% | 1 |
9 | INDECT PROJECT TEAM | 126179 | 1% | 50% | 1 |
10 | MPSOC ARCHITECTU | 126179 | 1% | 50% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 26211 | 3% | 3% | 4 |
2 | COMPUTERS & SECURITY | 7603 | 5% | 1% | 6 |
3 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 5361 | 11% | 0% | 13 |
4 | DESIGNS CODES AND CRYPTOGRAPHY | 3652 | 4% | 0% | 5 |
5 | COMPUTER COMMUNICATIONS | 3640 | 7% | 0% | 8 |
6 | MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE | 1194 | 1% | 0% | 1 |
7 | JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT | 909 | 1% | 0% | 1 |
8 | COMPUTER STANDARDS & INTERFACES | 809 | 2% | 0% | 2 |
9 | IET INFORMATION SECURITY | 782 | 1% | 0% | 1 |
10 | SECURITY AND COMMUNICATION NETWORKS | 725 | 2% | 0% | 2 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | RC4 | 7025923 | 29% | 80% | 35 | Search RC4 | Search RC4 |
2 | QUALITY OF PROTECTION | 573540 | 4% | 45% | 5 | Search QUALITY+OF+PROTECTION | Search QUALITY+OF+PROTECTION |
3 | DISTINGUISHING ATTACKS | 567809 | 2% | 75% | 3 | Search DISTINGUISHING+ATTACKS | Search DISTINGUISHING+ATTACKS |
4 | WEP | 567803 | 5% | 38% | 6 | Search WEP | Search WEP |
5 | BROADCAST SETTING | 504720 | 2% | 100% | 2 | Search BROADCAST+SETTING | Search BROADCAST+SETTING |
6 | FMS ATTACK | 504720 | 2% | 100% | 2 | Search FMS+ATTACK | Search FMS+ATTACK |
7 | KEYSTREAM BIASES | 504720 | 2% | 100% | 2 | Search KEYSTREAM+BIASES | Search KEYSTREAM+BIASES |
8 | PLAINTEXT RECOVERY ATTACK | 504720 | 2% | 100% | 2 | Search PLAINTEXT+RECOVERY+ATTACK | Search PLAINTEXT+RECOVERY+ATTACK |
9 | QUALITY OF SECURITY METRICS | 504720 | 2% | 100% | 2 | Search QUALITY+OF+SECURITY+METRICS | Search QUALITY+OF+SECURITY+METRICS |
10 | RC4A | 504720 | 2% | 100% | 2 | Search RC4A | Search RC4A |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | JINDAL, P , SINGH, B , (2017) OPTIMIZATION OF THE SECURITY-PERFORMANCE TRADEOFF IN RC4 ENCRYPTION ALGORITHM.WIRELESS PERSONAL COMMUNICATIONS. VOL. 92. ISSUE 3. P. 1221 -1250 | 10 | 91% | 0 |
2 | SEN GUPTA, S , MAITRA, S , PAUL, G , SARKAR, S , (2014) (NON-)RANDOM SEQUENCES FROM (NON-)RANDOM PERMUTATIONS-ANALYSIS OF RC4 STREAM CIPHER.JOURNAL OF CRYPTOLOGY. VOL. 27. ISSUE 1. P. 67-108 | 9 | 100% | 3 |
3 | PAUL, G , MAITRA, S , (2009) ON BIASES OF PERMUTATION AND KEYSTREAM BYTES OF RC4 TOWARDS THE SECRET KEY.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 1. ISSUE 2. P. 225-268 | 9 | 100% | 2 |
4 | KIRCANSKI, A , AL-ZAIDY, R , YOUSSEF, AM , (2009) A NEW DISTINGUISHING AND KEY RECOVERY ATTACK ON NGG STREAM CIPHER.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 1. ISSUE 2. P. 269-282 | 9 | 100% | 0 |
5 | SARKAR, S , (2015) FURTHER NON-RANDOMNESS IN RC4, RC4A AND VMPC.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 7. ISSUE 3. P. 317 -330 | 7 | 100% | 5 |
6 | ITO, R , MIYAJI, A , (2016) REFINED GLIMPSE CORRELATIONS OF RC4.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E99A. ISSUE 1. P. 3 -13 | 7 | 100% | 0 |
7 | MIYAJI, A , SUKEGAWA, M , (2010) NEW ANALYSIS BASED ON CORRELATIONS OF RC4 PRGA WITH NONZERO-BIT DIFFERENCES.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E93A. ISSUE 6. P. 1066 -1077 | 7 | 100% | 0 |
8 | MAZUR, K , KSIEZOPOLSKI, B , WIERZBICKI, A , (2015) ON SECURITY MANAGEMENT: IMPROVING ENERGY EFFICIENCY, DECREASING NEGATIVE ENVIRONMENTAL IMPACT, AND REDUCING FINANCIAL COSTS FOR DATA CENTERS.MATHEMATICAL PROBLEMS IN ENGINEERING. VOL. . ISSUE . P. - | 8 | 73% | 0 |
9 | TERAMURA, R , OHIGASHI, T , KUWAKADO, H , MORII, M , (2011) GENERALIZED CLASSES OF WEAK KEYS ON RC4 USING PREDICTIVE STATE.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E94A. ISSUE 1. P. 10 -18 | 6 | 100% | 0 |
10 | OHIGASHI, T , ISOBE, T , WATANABE, Y , MORII, M , (2015) FULL PLAINTEXT RECOVERY ATTACKS ON RC4 USING MULTIPLE BIASES.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E98A. ISSUE 1. P. 81 -91 | 6 | 86% | 0 |
Classes with closest relation at Level 1 |