Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
2473 | 3978 | 21.1 | 35% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | BLOCK CIPHER | authKW | 2015150 | 9% | 77% | 343 |
2 | STREAM CIPHER | authKW | 1225615 | 7% | 58% | 274 |
3 | BOOLEAN FUNCTIONS | authKW | 818599 | 7% | 36% | 296 |
4 | ALGEBRAIC IMMUNITY | authKW | 752069 | 2% | 100% | 98 |
5 | CRYPTANALYSIS | authKW | 607790 | 6% | 31% | 256 |
6 | ALGEBRAIC ATTACKS | authKW | 548928 | 2% | 87% | 82 |
7 | SIDE CHANNEL ATTACKS | authKW | 523632 | 3% | 50% | 137 |
8 | LINEAR CRYPTANALYSIS | authKW | 442712 | 2% | 90% | 64 |
9 | DIFFERENTIAL CRYPTANALYSIS | authKW | 407180 | 2% | 75% | 71 |
10 | CRYPTOGRAPHY | authKW | 406097 | 9% | 15% | 361 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 104471 | 45% | 1% | 1771 |
2 | Computer Science, Hardware & Architecture | 65645 | 23% | 1% | 913 |
3 | Computer Science, Information Systems | 42566 | 27% | 1% | 1076 |
4 | Computer Science, Software Engineering | 14919 | 14% | 0% | 576 |
5 | Engineering, Electrical & Electronic | 13045 | 34% | 0% | 1372 |
6 | Mathematics, Applied | 3786 | 13% | 0% | 530 |
7 | Telecommunications | 2393 | 7% | 0% | 281 |
8 | Computer Science, Interdisciplinary Applications | 332 | 3% | 0% | 124 |
9 | History & Philosophy of Science | 105 | 1% | 0% | 27 |
10 | Mathematics | 97 | 4% | 0% | 151 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ESAT COSIC | 184800 | 1% | 71% | 34 |
2 | COSIC | 163662 | 1% | 44% | 48 |
3 | PL STAT UNIT | 160568 | 2% | 23% | 93 |
4 | IAIK | 127896 | 1% | 83% | 20 |
5 | PL INFORMAT PROC COMMUN | 127876 | 1% | 56% | 30 |
6 | CIST | 115556 | 1% | 26% | 59 |
7 | STATE INFORMAT SECUR | 91780 | 3% | 11% | 111 |
8 | ESAT SCD COSIC | 75549 | 0% | 62% | 16 |
9 | SCDCOSIC | 71425 | 0% | 85% | 11 |
10 | HORST GORTZ IT SECUR | 69966 | 1% | 40% | 23 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | JOURNAL OF CRYPTOLOGY | 154315 | 2% | 21% | 94 |
2 | CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 150672 | 1% | 36% | 55 |
3 | LECTURE NOTES IN COMPUTER SCIENCE | 107609 | 28% | 1% | 1115 |
4 | IET INFORMATION SECURITY | 74647 | 1% | 17% | 56 |
5 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 60584 | 6% | 3% | 251 |
6 | DESIGNS CODES AND CRYPTOGRAPHY | 52714 | 3% | 6% | 109 |
7 | CRYPTOLOGIA | 47122 | 1% | 24% | 26 |
8 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 16949 | 1% | 4% | 56 |
9 | SECURITY AND COMMUNICATION NETWORKS | 14324 | 1% | 4% | 51 |
10 | IEEE TRANSACTIONS ON INFORMATION THEORY | 13702 | 3% | 1% | 130 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | BLOCK CIPHER | 2015150 | 9% | 77% | 343 | Search BLOCK+CIPHER | Search BLOCK+CIPHER |
2 | STREAM CIPHER | 1225615 | 7% | 58% | 274 | Search STREAM+CIPHER | Search STREAM+CIPHER |
3 | BOOLEAN FUNCTIONS | 818599 | 7% | 36% | 296 | Search BOOLEAN+FUNCTIONS | Search BOOLEAN+FUNCTIONS |
4 | ALGEBRAIC IMMUNITY | 752069 | 2% | 100% | 98 | Search ALGEBRAIC+IMMUNITY | Search ALGEBRAIC+IMMUNITY |
5 | CRYPTANALYSIS | 607790 | 6% | 31% | 256 | Search CRYPTANALYSIS | Search CRYPTANALYSIS |
6 | ALGEBRAIC ATTACKS | 548928 | 2% | 87% | 82 | Search ALGEBRAIC+ATTACKS | Search ALGEBRAIC+ATTACKS |
7 | SIDE CHANNEL ATTACKS | 523632 | 3% | 50% | 137 | Search SIDE+CHANNEL+ATTACKS | Search SIDE+CHANNEL+ATTACKS |
8 | LINEAR CRYPTANALYSIS | 442712 | 2% | 90% | 64 | Search LINEAR+CRYPTANALYSIS | Search LINEAR+CRYPTANALYSIS |
9 | DIFFERENTIAL CRYPTANALYSIS | 407180 | 2% | 75% | 71 | Search DIFFERENTIAL+CRYPTANALYSIS | Search DIFFERENTIAL+CRYPTANALYSIS |
10 | CRYPTOGRAPHY | 406097 | 9% | 15% | 361 | Search CRYPTOGRAPHY | Search CRYPTOGRAPHY |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | ANDREEVA, E , MENNINK, B , PRENEEL, B , (2015) OPEN PROBLEMS IN HASH FUNCTION SECURITY.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 77. ISSUE 2-3. P. 611 -631 | 31 | 100% | 2 |
2 | KUNDI, DS , AZIZ, A , IKRAM, N , (2016) A HIGH PERFORMANCE ST-BOX BASED UNIFIED AES ENCRYPTION/DECRYPTION ARCHITECTURE ON FPGA.MICROPROCESSORS AND MICROSYSTEMS. VOL. 41. ISSUE . P. 37 -46 | 25 | 96% | 1 |
3 | KIM, J , PHAN, RCW , (2009) ADVANCED DIFFERENTIAL-STYLE CRYPTANALYSIS OF THE NSA'S SKIPJACK BLOCK CIPHER.CRYPTOLOGIA. VOL. 33. ISSUE 3. P. 246 -270 | 29 | 100% | 4 |
4 | ZHANG, JL , QU, G , LV, YQ , ZHOU, Q , (2014) A SURVEY ON SILICON PUFS AND RECENT ADVANCES IN RING OSCILLATOR PUFS.JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY. VOL. 29. ISSUE 4. P. 664 -678 | 24 | 96% | 7 |
5 | TENA-SANCHEZ, E , CASTRO, J , ACOSTA, AJ , (2014) A METHODOLOGY FOR OPTIMIZED DESIGN OF SECURE DIFFERENTIAL LOGIC GATES FOR DPA RESISTANT CIRCUITS.IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS. VOL. 4. ISSUE 2. P. 203 -215 | 26 | 93% | 1 |
6 | ROSTAMI, M , KOUSHANFAR, F , KARRI, R , (2014) A PRIMER ON HARDWARE SECURITY: MODELS, METHODS, AND METRICS.PROCEEDINGS OF THE IEEE. VOL. 102. ISSUE 8. P. 1283 -1295 | 21 | 88% | 33 |
7 | TANG, D , CARLET, C , TANG, XH , (2014) A CLASS OF 1-RESILIENT BOOLEAN FUNCTIONS WITH OPTIMAL ALGEBRAIC IMMUNITY AND GOOD BEHAVIOR AGAINST FAST ALGEBRAIC ATTACKS.INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE. VOL. 25. ISSUE 6. P. 763 -780 | 23 | 100% | 0 |
8 | PRENEEL, B , (2007) A SURVEY OF RECENT DEVELOPMENTS IN CRYPTOGRAPHIC ALGORITHMS FOR SMART CARDS.COMPUTER NETWORKS. VOL. 51. ISSUE 9. P. 2223-2233 | 32 | 82% | 6 |
9 | VAUDENAY, S , (2003) DECORRELATION: A THEORY FOR BLOCK CIPHER SECURITY.JOURNAL OF CRYPTOLOGY. VOL. 16. ISSUE 4. P. 249 -286 | 28 | 97% | 57 |
10 | LU, Y , VAUDENAY, S , (2008) CRYPTANALYSIS OF AN E0-LIKE COMBINER WITH MEMORY.JOURNAL OF CRYPTOLOGY. VOL. 21. ISSUE 3. P. 430 -457 | 25 | 100% | 5 |
Classes with closest relation at Level 2 |