Class information for:
Level 2: BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
2473 3978 21.1 35%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
2473 2             BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS 3978
7292 1                   BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//HASH FUNCTION 1385
10813 1                   BOOLEAN FUNCTIONS//ALGEBRAIC IMMUNITY//STREAM CIPHER 1033
13312 1                   SIDE CHANNEL ATTACKS//ADVANCED ENCRYPTION STANDARD AES//SIDE CHANNEL ANALYSIS 846
21091 1                   HARDWARE SECURITY//PHYSICAL UNCLONABLE FUNCTION//HARDWARE TROJAN 434
31079 1                   CAUSAL MAPPINGS//ABSTRACT DIFFERENTIAL DELAY EQUATIONS//ABSTRACT NONLINEAR DIFFERENTIAL DELAY EQUATIONS 159
33726 1                   RC4//QUALITY OF PROTECTION//DISTINGUISHING ATTACKS 121

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 BLOCK CIPHER authKW 2015150 9% 77% 343
2 STREAM CIPHER authKW 1225615 7% 58% 274
3 BOOLEAN FUNCTIONS authKW 818599 7% 36% 296
4 ALGEBRAIC IMMUNITY authKW 752069 2% 100% 98
5 CRYPTANALYSIS authKW 607790 6% 31% 256
6 ALGEBRAIC ATTACKS authKW 548928 2% 87% 82
7 SIDE CHANNEL ATTACKS authKW 523632 3% 50% 137
8 LINEAR CRYPTANALYSIS authKW 442712 2% 90% 64
9 DIFFERENTIAL CRYPTANALYSIS authKW 407180 2% 75% 71
10 CRYPTOGRAPHY authKW 406097 9% 15% 361

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 Computer Science, Theory & Methods 104471 45% 1% 1771
2 Computer Science, Hardware & Architecture 65645 23% 1% 913
3 Computer Science, Information Systems 42566 27% 1% 1076
4 Computer Science, Software Engineering 14919 14% 0% 576
5 Engineering, Electrical & Electronic 13045 34% 0% 1372
6 Mathematics, Applied 3786 13% 0% 530
7 Telecommunications 2393 7% 0% 281
8 Computer Science, Interdisciplinary Applications 332 3% 0% 124
9 History & Philosophy of Science 105 1% 0% 27
10 Mathematics 97 4% 0% 151

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 ESAT COSIC 184800 1% 71% 34
2 COSIC 163662 1% 44% 48
3 PL STAT UNIT 160568 2% 23% 93
4 IAIK 127896 1% 83% 20
5 PL INFORMAT PROC COMMUN 127876 1% 56% 30
6 CIST 115556 1% 26% 59
7 STATE INFORMAT SECUR 91780 3% 11% 111
8 ESAT SCD COSIC 75549 0% 62% 16
9 SCDCOSIC 71425 0% 85% 11
10 HORST GORTZ IT SECUR 69966 1% 40% 23

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 JOURNAL OF CRYPTOLOGY 154315 2% 21% 94
2 CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES 150672 1% 36% 55
3 LECTURE NOTES IN COMPUTER SCIENCE 107609 28% 1% 1115
4 IET INFORMATION SECURITY 74647 1% 17% 56
5 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 60584 6% 3% 251
6 DESIGNS CODES AND CRYPTOGRAPHY 52714 3% 6% 109
7 CRYPTOLOGIA 47122 1% 24% 26
8 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 16949 1% 4% 56
9 SECURITY AND COMMUNICATION NETWORKS 14324 1% 4% 51
10 IEEE TRANSACTIONS ON INFORMATION THEORY 13702 3% 1% 130

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 BLOCK CIPHER 2015150 9% 77% 343 Search BLOCK+CIPHER Search BLOCK+CIPHER
2 STREAM CIPHER 1225615 7% 58% 274 Search STREAM+CIPHER Search STREAM+CIPHER
3 BOOLEAN FUNCTIONS 818599 7% 36% 296 Search BOOLEAN+FUNCTIONS Search BOOLEAN+FUNCTIONS
4 ALGEBRAIC IMMUNITY 752069 2% 100% 98 Search ALGEBRAIC+IMMUNITY Search ALGEBRAIC+IMMUNITY
5 CRYPTANALYSIS 607790 6% 31% 256 Search CRYPTANALYSIS Search CRYPTANALYSIS
6 ALGEBRAIC ATTACKS 548928 2% 87% 82 Search ALGEBRAIC+ATTACKS Search ALGEBRAIC+ATTACKS
7 SIDE CHANNEL ATTACKS 523632 3% 50% 137 Search SIDE+CHANNEL+ATTACKS Search SIDE+CHANNEL+ATTACKS
8 LINEAR CRYPTANALYSIS 442712 2% 90% 64 Search LINEAR+CRYPTANALYSIS Search LINEAR+CRYPTANALYSIS
9 DIFFERENTIAL CRYPTANALYSIS 407180 2% 75% 71 Search DIFFERENTIAL+CRYPTANALYSIS Search DIFFERENTIAL+CRYPTANALYSIS
10 CRYPTOGRAPHY 406097 9% 15% 361 Search CRYPTOGRAPHY Search CRYPTOGRAPHY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 ANDREEVA, E , MENNINK, B , PRENEEL, B , (2015) OPEN PROBLEMS IN HASH FUNCTION SECURITY.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 77. ISSUE 2-3. P. 611 -631 31 100% 2
2 KUNDI, DS , AZIZ, A , IKRAM, N , (2016) A HIGH PERFORMANCE ST-BOX BASED UNIFIED AES ENCRYPTION/DECRYPTION ARCHITECTURE ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 41. ISSUE . P. 37 -46 25 96% 1
3 KIM, J , PHAN, RCW , (2009) ADVANCED DIFFERENTIAL-STYLE CRYPTANALYSIS OF THE NSA'S SKIPJACK BLOCK CIPHER.CRYPTOLOGIA. VOL. 33. ISSUE 3. P. 246 -270 29 100% 4
4 ZHANG, JL , QU, G , LV, YQ , ZHOU, Q , (2014) A SURVEY ON SILICON PUFS AND RECENT ADVANCES IN RING OSCILLATOR PUFS.JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. VOL. 29. ISSUE 4. P. 664 -678 24 96% 7
5 TENA-SANCHEZ, E , CASTRO, J , ACOSTA, AJ , (2014) A METHODOLOGY FOR OPTIMIZED DESIGN OF SECURE DIFFERENTIAL LOGIC GATES FOR DPA RESISTANT CIRCUITS.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 203 -215 26 93% 1
6 ROSTAMI, M , KOUSHANFAR, F , KARRI, R , (2014) A PRIMER ON HARDWARE SECURITY: MODELS, METHODS, AND METRICS.PROCEEDINGS OF THE IEEE. VOL. 102. ISSUE 8. P. 1283 -1295 21 88% 33
7 TANG, D , CARLET, C , TANG, XH , (2014) A CLASS OF 1-RESILIENT BOOLEAN FUNCTIONS WITH OPTIMAL ALGEBRAIC IMMUNITY AND GOOD BEHAVIOR AGAINST FAST ALGEBRAIC ATTACKS.INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. VOL. 25. ISSUE 6. P. 763 -780 23 100% 0
8 PRENEEL, B , (2007) A SURVEY OF RECENT DEVELOPMENTS IN CRYPTOGRAPHIC ALGORITHMS FOR SMART CARDS.COMPUTER NETWORKS. VOL. 51. ISSUE 9. P. 2223-2233 32 82% 6
9 VAUDENAY, S , (2003) DECORRELATION: A THEORY FOR BLOCK CIPHER SECURITY.JOURNAL OF CRYPTOLOGY. VOL. 16. ISSUE 4. P. 249 -286 28 97% 57
10 LU, Y , VAUDENAY, S , (2008) CRYPTANALYSIS OF AN E0-LIKE COMBINER WITH MEMORY.JOURNAL OF CRYPTOLOGY. VOL. 21. ISSUE 3. P. 430 -457 25 100% 5

Classes with closest relation at Level 2



Rank Class id link
1 2567 LINEAR COMPLEXITY//PERMUTATION POLYNOMIAL//FINITE FIELDS AND THEIR APPLICATIONS
2 1707 JOURNAL OF SYMBOLIC COMPUTATION//SCALAR MULTIPLICATION//FINITE FIELDS
3 632 AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE
4 2771 RFID//ANTI COLLISION//RADIO FREQUENCY IDENTIFICATION
5 1591 COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION
6 2540 CELLULAR AUTOMATA//JOURNAL OF CELLULAR AUTOMATA//PHYSARUM POLYCEPHALUM
7 470 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE//IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS//NETWORK ON CHIP
8 2087 STEGANOGRAPHY//WATERMARKING//DIGITAL WATERMARKING
9 4121 PERSONAL INFORMATION MANAGEMENT//PERSONAL INFORMATION SYSTEMS//PERSONAL KNOWLEDGE MANAGEMENT
10 3472 RESIDUE NUMBER SYSTEM//RESIDUE NUMBER SYSTEM RNS//RESIDUE ARITHMETIC

Go to start page