Class information for: |
Basic class information |
| ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
|---|---|---|---|
| 1719 | 6083 | 20.0 | 36% |
Classes in level above (level 3) |
| ID, lev. above |
Publications | Label for level above |
|---|---|---|
| 450 | 23673 | CRYPTOGRAPHY//JOURNAL OF CRYPTOLOGY//CRYPTANALYSIS |
Classes in level below (level 1) |
| ID, lev. below | Publications | Label for level below |
|---|---|---|
| 1678 | 2459 | SCALAR MULTIPLICATION//MODULAR MULTIPLICATION//FINITE FIELD ARITHMETIC |
| 7458 | 1286 | BLOCK CIPHER//DIFFERENTIAL CRYPTANALYSIS//BLOCK CIPHERS |
| 8679 | 1160 | ALGEBRAIC IMMUNITY//ALGEBRAIC DEGREE//BOOLEAN FUNCTION |
| 13762 | 752 | SIDE CHANNEL ATTACKS//DIFFERENTIAL POWER ANALYSIS DPA//ADVANCED ENCRYPTION STANDARD AES |
| 19775 | 426 | INTELLECTUAL PROPERTY PROTECTION IPP//HARDWARE METERING//HARDWARE SECURITY |
Terms with highest relevance score |
| Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|---|
| 1 | BLOCK CIPHER | Author keyword | 110 | 43% | 3% | 198 |
| 2 | ALGEBRAIC IMMUNITY | Author keyword | 99 | 66% | 1% | 91 |
| 3 | CRYPTOGRAPHY | Author keyword | 97 | 16% | 9% | 568 |
| 4 | SIDE CHANNEL ATTACKS | Author keyword | 93 | 50% | 2% | 133 |
| 5 | PL INFORMAT PROC COMMUN | Address | 88 | 85% | 1% | 46 |
| 6 | SCALAR MULTIPLICATION | Author keyword | 70 | 54% | 1% | 89 |
| 7 | STREAM CIPHER | Author keyword | 69 | 34% | 3% | 166 |
| 8 | ALGEBRAIC DEGREE | Author keyword | 67 | 67% | 1% | 60 |
| 9 | BLOCK CIPHERS | Author keyword | 63 | 45% | 2% | 104 |
| 10 | CRYPTANALYSIS | Author keyword | 58 | 21% | 4% | 248 |
Web of Science journal categories |
Author Key Words |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
|---|---|---|---|---|---|---|---|
| 1 | BLOCK CIPHER | 110 | 43% | 3% | 198 | Search BLOCK+CIPHER | Search BLOCK+CIPHER |
| 2 | ALGEBRAIC IMMUNITY | 99 | 66% | 1% | 91 | Search ALGEBRAIC+IMMUNITY | Search ALGEBRAIC+IMMUNITY |
| 3 | CRYPTOGRAPHY | 97 | 16% | 9% | 568 | Search CRYPTOGRAPHY | Search CRYPTOGRAPHY |
| 4 | SIDE CHANNEL ATTACKS | 93 | 50% | 2% | 133 | Search SIDE+CHANNEL+ATTACKS | Search SIDE+CHANNEL+ATTACKS |
| 5 | SCALAR MULTIPLICATION | 70 | 54% | 1% | 89 | Search SCALAR+MULTIPLICATION | Search SCALAR+MULTIPLICATION |
| 6 | STREAM CIPHER | 69 | 34% | 3% | 166 | Search STREAM+CIPHER | Search STREAM+CIPHER |
| 7 | ALGEBRAIC DEGREE | 67 | 67% | 1% | 60 | Search ALGEBRAIC+DEGREE | Search ALGEBRAIC+DEGREE |
| 8 | BLOCK CIPHERS | 63 | 45% | 2% | 104 | Search BLOCK+CIPHERS | Search BLOCK+CIPHERS |
| 9 | CRYPTANALYSIS | 58 | 21% | 4% | 248 | Search CRYPTANALYSIS | Search CRYPTANALYSIS |
| 10 | MODULAR MULTIPLICATION | 54 | 52% | 1% | 74 | Search MODULAR+MULTIPLICATION | Search MODULAR+MULTIPLICATION |
Key Words Plus |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | GF2M | 180 | 62% | 3% | 188 |
| 2 | STREAM CIPHERS | 107 | 57% | 2% | 127 |
| 3 | CRYPTANALYSIS | 74 | 23% | 5% | 283 |
| 4 | FINITE FIELDS GF2M | 69 | 77% | 1% | 47 |
| 5 | ELLIPTIC CURVE CRYPTOSYSTEMS | 68 | 54% | 1% | 87 |
| 6 | LINEAR FEEDBACK | 66 | 56% | 1% | 80 |
| 7 | CRYPTOSYSTEMS | 62 | 23% | 4% | 231 |
| 8 | BIT SERIAL MULTIPLICATION | 57 | 95% | 0% | 19 |
| 9 | CORRELATION IMMUNITY | 44 | 85% | 0% | 23 |
| 10 | ALGEBRAIC ATTACKS | 41 | 58% | 1% | 47 |
Journals |
| Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | JOURNAL OF CRYPTOLOGY | 49 | 32% | 2% | 126 |
| 2 | CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 24 | 41% | 1% | 45 |
| 3 | DESIGNS CODES AND CRYPTOGRAPHY | 17 | 10% | 3% | 157 |
| 4 | IET INFORMATION SECURITY | 16 | 23% | 1% | 61 |
| 5 | CRYPTOLOGIA | 5 | 18% | 0% | 24 |
| 6 | ADVANCES IN MATHEMATICS OF COMMUNICATIONS | 4 | 12% | 1% | 35 |
| 7 | IEEE DESIGN & TEST | 1 | 11% | 0% | 11 |
Reviews |
| Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
|---|---|---|---|---|
| Literature survey on nonlinear components and chaotic nonlinear components of block ciphers | 2013 | 3 | 23 | 83% |
| Security Issues and Attacks on the GSM Standard: a Review | 2013 | 1 | 4 | 75% |
| Hardware architectures for public key cryptography | 2003 | 23 | 90 | 88% |
| Survey and Benchmark of Block Ciphers for Wireless Sensor Networks | 2006 | 5 | 23 | 87% |
| Review of Elliptic Curve Cryptography processor designs | 2015 | 0 | 38 | 92% |
| CLOCK-CONTROLLED SHIFT REGISTERS - A REVIEW | 1989 | 61 | 9 | 100% |
| Elliptic-curve scalar multiplication algorithm using ZOT structure | 2015 | 0 | 19 | 89% |
| Review of gate-level differential power analysis and fault analysis countermeasures | 2014 | 0 | 17 | 82% |
| A survey of public-key cryptosystems | 2004 | 11 | 58 | 64% |
| Algebraic curves and cryptography | 2005 | 3 | 62 | 89% |
Address terms |
| Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
|---|---|---|---|---|---|
| 1 | PL INFORMAT PROC COMMUN | 88 | 85% | 0.8% | 46 |
| 2 | COSIC | 56 | 59% | 1.0% | 63 |
| 3 | ESAT COSIC | 39 | 74% | 0.5% | 29 |
| 4 | IAIK | 36 | 83% | 0.3% | 20 |
| 5 | CRYPTOL GRP | 35 | 86% | 0.3% | 18 |
| 6 | ESAT SCD COSIC | 35 | 81% | 0.3% | 21 |
| 7 | CIST | 35 | 36% | 1.3% | 78 |
| 8 | COMP INFORMAT NETWORK ENGN | 31 | 58% | 0.6% | 36 |
| 9 | UCL CRYPTO GRP | 29 | 75% | 0.3% | 21 |
| 10 | PL STAT UNIT | 28 | 26% | 1.5% | 94 |
Related classes at same level (level 2) |
| Rank | Relatedness score | Related classes |
|---|---|---|
| 1 | 0.0000028635 | CRYPTOGRAPHY//PASSWORD//JOURNAL OF CRYPTOLOGY |
| 2 | 0.0000013443 | JOURNAL OF SYMBOLIC COMPUTATION//IMPLICITIZATION//MU BASIS |
| 3 | 0.0000012282 | IEEE TRANSACTIONS ON INFORMATION THEORY//FINITE FIELDS AND THEIR APPLICATIONS//LOW DENSITY PARITY CHECK LDPC CODES |
| 4 | 0.0000008787 | RESIDUE NUMBER SYSTEM RNS//RESIDUE NUMBER SYSTEM//RESIDUE ARITHMETIC |
| 5 | 0.0000007855 | JOURNAL OF CELLULAR AUTOMATA//CELLULAR AUTOMATA//ELEMENTARY CELLULAR AUTOMATA |
| 6 | 0.0000006232 | IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS//IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS//HIGH LEVEL SYNTHESIS |
| 7 | 0.0000006169 | ACTA ARITHMETICA//JOURNAL OF NUMBER THEORY//CIRCLE METHOD |
| 8 | 0.0000004513 | RADIO FREQUENCY IDENTIFICATION RFID//RFID//WIRELESS POWER TRANSFER |
| 9 | 0.0000004218 | PRIVACY CALCULUS//ACCESS CONTROL//INFORMATION PRIVACY |
| 10 | 0.0000004026 | MULTIPLE VALUED LOGIC//LOGIC SYNTHESIS//REED MULLER EXPANSIONS |