Class information for:
Level 1: BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
7292 1385 19.7 33%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
2473 2             BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS 3978
7292 1                   BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION 1385

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 BLOCK CIPHER authKW 3885364 20% 63% 281
2 DIFFERENTIAL CRYPTANALYSIS authKW 1041670 5% 71% 67
3 HASH FUNCTION authKW 841894 9% 32% 120
4 LINEAR CRYPTANALYSIS authKW 839565 4% 73% 52
5 CRYPTANALYSIS authKW 478433 10% 16% 134
6 RELATED KEY ATTACK authKW 475112 2% 86% 25
7 IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS authKW 352728 1% 100% 16
8 MODES OF OPERATION authKW 334146 2% 63% 24
9 MESSAGE AUTHENTICATION CODE authKW 319985 2% 48% 30
10 INDIFFERENTIABILITY authKW 310013 1% 94% 15

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Theory & Methods 66311 60% 0% 829
2 Computer Science, Information Systems 21171 32% 0% 446
3 Computer Science, Hardware & Architecture 10027 15% 0% 212
4 Computer Science, Software Engineering 9597 19% 0% 270
5 Engineering, Electrical & Electronic 2330 26% 0% 354
6 Mathematics, Applied 1632 15% 0% 203
7 Telecommunications 1036 8% 0% 108
8 History & Philosophy of Science 361 2% 0% 26
9 COMPUTER APPLICATIONS & CYBERNETICS 70 0% 0% 3
10 Computer Science, Artificial Intelligence 35 2% 0% 27

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ESAT COSIC 222269 2% 46% 22
2 CIST 219807 3% 21% 48
3 COSIC 171627 2% 27% 29
4 NTT SECURE PLATFORM S 111751 1% 30% 17
5 INFORMAT SECUR TECHNOL 93330 2% 18% 24
6 IAIK 74392 1% 38% 9
7 ELECT ENGN ESAT COSIC 70544 0% 80% 4
8 ESAT SCD COSIC 68669 1% 35% 9
9 INFORMAT SECUR GRP 68265 2% 11% 28
10 COMP INFORMAT MATH 66137 0% 100% 3

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 JOURNAL OF CRYPTOLOGY 238970 5% 16% 69
2 CRYPTOLOGIA 125220 2% 23% 25
3 LECTURE NOTES IN COMPUTER SCIENCE 81589 41% 1% 571
4 IET INFORMATION SECURITY 53625 2% 9% 28
5 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 53528 10% 2% 139
6 DESIGNS CODES AND CRYPTOGRAPHY 35838 4% 3% 53
7 CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 20592 1% 8% 12
8 SECURITY AND COMMUNICATION NETWORKS 12433 2% 2% 28
9 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 7662 1% 3% 10
10 INFORMATION PROCESSING LETTERS 6067 3% 1% 42

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 BLOCK CIPHER 3885364 20% 63% 281 Search BLOCK+CIPHER Search BLOCK+CIPHER
2 DIFFERENTIAL CRYPTANALYSIS 1041670 5% 71% 67 Search DIFFERENTIAL+CRYPTANALYSIS Search DIFFERENTIAL+CRYPTANALYSIS
3 HASH FUNCTION 841894 9% 32% 120 Search HASH+FUNCTION Search HASH+FUNCTION
4 LINEAR CRYPTANALYSIS 839565 4% 73% 52 Search LINEAR+CRYPTANALYSIS Search LINEAR+CRYPTANALYSIS
5 CRYPTANALYSIS 478433 10% 16% 134 Search CRYPTANALYSIS Search CRYPTANALYSIS
6 RELATED KEY ATTACK 475112 2% 86% 25 Search RELATED+KEY+ATTACK Search RELATED+KEY+ATTACK
7 IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS 352728 1% 100% 16 Search IMPOSSIBLE+DIFFERENTIAL+CRYPTANALYSIS Search IMPOSSIBLE+DIFFERENTIAL+CRYPTANALYSIS
8 MODES OF OPERATION 334146 2% 63% 24 Search MODES+OF+OPERATION Search MODES+OF+OPERATION
9 MESSAGE AUTHENTICATION CODE 319985 2% 48% 30 Search MESSAGE+AUTHENTICATION+CODE Search MESSAGE+AUTHENTICATION+CODE
10 INDIFFERENTIABILITY 310013 1% 94% 15 Search INDIFFERENTIABILITY Search INDIFFERENTIABILITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 ANDREEVA, E , MENNINK, B , PRENEEL, B , (2015) OPEN PROBLEMS IN HASH FUNCTION SECURITY.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 77. ISSUE 2-3. P. 611 -631 31 100% 2
2 KIM, J , PHAN, RCW , (2009) ADVANCED DIFFERENTIAL-STYLE CRYPTANALYSIS OF THE NSA'S SKIPJACK BLOCK CIPHER.CRYPTOLOGIA. VOL. 33. ISSUE 3. P. 246 -270 29 100% 4
3 VAUDENAY, S , (2003) DECORRELATION: A THEORY FOR BLOCK CIPHER SECURITY.JOURNAL OF CRYPTOLOGY. VOL. 16. ISSUE 4. P. 249 -286 28 97% 57
4 LEE, DG , KIM, J , SUNG, J , LEE, YS , RHO, S , (2010) CRYPTANALYSIS OF BLOCK-WISE STREAM CIPHERS SUITABLE FOR THE PROTECTION OF MULTIMEDIA AND UBIQUITOUS SYSTEMS.TELECOMMUNICATION SYSTEMS. VOL. 44. ISSUE 3-4. P. 297 -306 23 100% 2
5 CHAKRABORTY, D , SARKAR, P , (2016) ON MODES OF OPERATIONS OF A BLOCK CIPHER FOR AUTHENTICATION AND AUTHENTICATED ENCRYPTION.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 8. ISSUE 4. P. 455 -511 20 95% 0
6 JOYE, M , PHAN, RCW , RAZALI, E , SUNG, J , KIM, J , (2011) NOTIONS AND RELATIONS FOR RKA-SECURE PERMUTATION AND FUNCTION FAMILIES.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 60. ISSUE 1. P. 15 -35 22 96% 0
7 GAURAVARAM, P , KNUDSEN, LR , (2012) SECURITY ANALYSIS OF RANDOMIZE-HASH-THEN-SIGN DIGITAL SIGNATURES.JOURNAL OF CRYPTOLOGY. VOL. 25. ISSUE 4. P. 748 -779 21 95% 2
8 SARKAR, P , (2010) PSEUDO-RANDOM FUNCTIONS AND PARALLELIZABLE MODES OF OPERATIONS OF A BLOCK CIPHER.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 57. ISSUE 8. P. 4025 -4037 20 100% 8
9 SARKAR, P , (2014) MODES OF OPERATIONS FOR ENCRYPTION AND AUTHENTICATION USING STREAM CIPHERS SUPPORTING AN INITIALISATION VECTOR.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 6. ISSUE 3. P. 189 -231 19 95% 3
10 LI, RL , LI, C , SU, JS , SUN, B , (2013) SECURITY EVALUATION OF MISTY STRUCTURE WITH SPN ROUND FUNCTION.COMPUTERS & MATHEMATICS WITH APPLICATIONS. VOL. 65. ISSUE 9. P. 1264 -1279 19 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 10813 BOOLEAN FUNCTIONS//ALGEBRAIC IMMUNITY//STREAM CIPHER
2 13312 SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS
3 33726 RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS
4 33109 SPLITTING AUTHENTICATION CODE//AUTHENTICATION CODE//METERING SCHEME
5 7314 ZERO KNOWLEDGE//OBLIVIOUS TRANSFER//JOURNAL OF CRYPTOLOGY
6 36636 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION
7 16868 RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK
8 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
9 5631 IMAGE ENCRYPTION//CHOSEN PLAINTEXT ATTACK//SELECTIVE ENCRYPTION
10 21991 MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM//MULTIVARIATE CRYPTOGRAPHY//SFLASH

Go to start page