Class information for:
Level 3: CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
295 41419 21.3 40%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
1044 2             NETWORK CODING//LOW DENSITY PARITY CHECK LDPC CODES//ITERATIVE DECODING 10120
1707 2             JOURNAL OF SYMBOLIC COMPUTATION//SCALAR MULTIPLICATION//FINITE FIELDS 6697
2473 2             BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS 3978
2567 2             LINEAR COMPLEXITY//PERMUTATION POLYNOMIAL//FINITE FIELDS AND THEIR APPLICATIONS 3707
2771 2             RFID//ANTI COLLISION//RADIO FREQUENCY IDENTIFICATION 3146

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 CRYPTOGRAPHY authKW 869180 4% 69% 1706
2 COMPUTER SCIENCE, THEORY & METHODS WoSSC 487779 30% 6% 12448
3 IEEE TRANSACTIONS ON INFORMATION THEORY journal 482644 6% 27% 2479
4 COMPUTER SCIENCE, INFORMATION SYSTEMS WoSSC 452131 27% 6% 11313
5 DESIGNS CODES AND CRYPTOGRAPHY journal 391600 2% 56% 959
6 AUTHENTICATION authKW 366096 3% 46% 1097
7 FINITE FIELDS authKW 316778 2% 56% 766
8 FINITE FIELDS AND THEIR APPLICATIONS journal 304079 2% 64% 650
9 NETWORK CODING authKW 294900 2% 58% 693
10 RFID authKW 292655 2% 48% 838

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 Computer Science, Theory & Methods 487779 30% 6% 12448
2 Computer Science, Information Systems 452131 27% 6% 11313
3 Telecommunications 181778 18% 4% 7425
4 Computer Science, Hardware & Architecture 170624 12% 5% 4814
5 Engineering, Electrical & Electronic 113343 32% 1% 13158
6 Mathematics, Applied 67321 17% 2% 7024
7 Computer Science, Software Engineering 54085 9% 2% 3627
8 Mathematics 26684 12% 1% 5102
9 Computer Science, Interdisciplinary Applications 4558 3% 1% 1439
10 Computer Science, Artificial Intelligence 3650 3% 1% 1271

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 STATE INFORMAT SECUR 245939 1% 57% 587
2 INFORMAT SECUR 123144 1% 37% 459
3 INFORMAT SECUR GRP 96160 0% 72% 182
4 CIST 74405 0% 66% 153
5 COMP SCI 73514 10% 3% 4040
6 COMP SCI ENGN 62603 4% 5% 1772
7 COSIC 51495 0% 81% 87
8 COMP NETWORKS INFORMAT SECUR 50548 0% 75% 92
9 COMP INFORMAT SECUR 47362 0% 69% 94
10 COMP SCI INFORMAT ENGN 47180 2% 8% 846

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 IEEE TRANSACTIONS ON INFORMATION THEORY 482644 6% 27% 2479
2 DESIGNS CODES AND CRYPTOGRAPHY 391600 2% 56% 959
3 FINITE FIELDS AND THEIR APPLICATIONS 304079 2% 64% 650
4 LECTURE NOTES IN COMPUTER SCIENCE 290374 14% 7% 5968
5 JOURNAL OF CRYPTOLOGY 257275 1% 89% 392
6 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 208480 4% 19% 1507
7 SECURITY AND COMMUNICATION NETWORKS 161797 1% 40% 553
8 ADVANCES IN MATHEMATICS OF COMMUNICATIONS 129805 1% 70% 254
9 JOURNAL OF SYMBOLIC COMPUTATION 122994 1% 27% 616
10 APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING 114603 1% 51% 308

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
LCSH search Wikipedia search
1 CRYPTOGRAPHY 869180 4% 69% 1706 Search CRYPTOGRAPHY Search CRYPTOGRAPHY
2 AUTHENTICATION 366096 3% 46% 1097 Search AUTHENTICATION Search AUTHENTICATION
3 FINITE FIELDS 316778 2% 56% 766 Search FINITE+FIELDS Search FINITE+FIELDS
4 NETWORK CODING 294900 2% 58% 693 Search NETWORK+CODING Search NETWORK+CODING
5 RFID 292655 2% 48% 838 Search RFID Search RFID
6 CRYPTANALYSIS 283449 1% 68% 565 Search CRYPTANALYSIS Search CRYPTANALYSIS
7 DIGITAL SIGNATURE 282202 1% 79% 488 Search DIGITAL+SIGNATURE Search DIGITAL+SIGNATURE
8 LOW DENSITY PARITY CHECK LDPC CODES 273814 1% 75% 499 Search LOW+DENSITY+PARITY+CHECK+LDPC+CODES Search LOW+DENSITY+PARITY+CHECK+LDPC+CODES
9 SMART CARD 259764 1% 75% 472 Search SMART+CARD Search SMART+CARD
10 ITERATIVE DECODING 242292 1% 62% 530 Search ITERATIVE+DECODING Search ITERATIVE+DECODING

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref. in
cl.
Shr. of ref. in
cl.
Citations
1 FARASH, MS , ATTARI, MA , KUMARI, S , (2017) CRYPTANALYSIS AND IMPROVEMENT OF A THREE-PARTY PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITH USER ANONYMITY USING EXTENDED CHAOTIC MAPS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 52 98% 4
2 FARASH, MS , (2017) AN IMPROVED PASSWORD-BASED AUTHENTICATION SCHEME FOR SESSION INITIATION PROTOCOL USING SMART CARDS WITHOUT VERIFICATION TABLE.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 30 91% 13
3 CARLET, C , MESNAGER, S , (2016) FOUR DECADES OF RESEARCH ON BENT FUNCTIONS.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 78. ISSUE 1. P. 5 -50 107 95% 3
4 FAN, HN , HASAN, MA , (2015) A SURVEY OF SOME RECENT BIT-PARALLEL GF(2(N)) MULTIPLIERS.FINITE FIELDS AND THEIR APPLICATIONS. VOL. 32. ISSUE . P. 5 -43 99 98% 6
5 BASSOLI, R , MARQUES, H , RODRIGUEZ, J , SHUM, KW , TAFAZOLLI, R , (2013) NETWORK CODING THEORY: A SURVEY.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 15. ISSUE 4. P. 1950 -1978 78 92% 22
6 HUFFMAN, WC , (2005) ON THE CLASSIFICATION AND ENUMERATION OF SELF-DUAL CODES.FINITE FIELDS AND THEIR APPLICATIONS. VOL. 11. ISSUE 3. P. 451-490 89 99% 74
7 WANG, D , WANG, P , (2014) ON THE ANONYMITY OF TWO-FACTOR AUTHENTICATION SCHEMES FOR WIRELESS SENSOR NETWORKS: ATTACKS, PRINCIPLE AND SOLUTIONS.COMPUTER NETWORKS. VOL. 73. ISSUE . P. 41 -57 67 92% 24
8 POTT, A , (2016) ALMOST PERFECT AND PLANAR FUNCTIONS.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 78. ISSUE 1. P. 141 -195 84 82% 0
9 ORS, SB , PRENEEL, B , VANDEWALLE, J , BATINA, L , (2003) HARDWARE ARCHITECTURES FOR PUBLIC KEY CRYPTOGRAPHY.INTEGRATION-THE VLSI JOURNAL. VOL. 34. ISSUE 1-2. P. 1 -64 97 93% 27
10 JIANG, Q , WEI, FS , FU, S , MA, JF , LI, GS , ALELAIWI, A , (2016) ROBUST EXTENDED CHAOTIC MAPS-BASED THREE-FACTOR AUTHENTICATION SCHEME PRESERVING BIOMETRIC TEMPLATE PRIVACY.NONLINEAR DYNAMICS. VOL. 83. ISSUE 4. P. 2085 -2101 45 94% 9

Classes with closest relation at Level 3



Rank Class id link
1 616 JOURNAL OF COMBINATORIAL DESIGNS//DISCRETE MATHEMATICS//MATHEMATICS
2 22 TELECOMMUNICATIONS//ENGINEERING, ELECTRICAL & ELECTRONIC//IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
3 377 TOPOLOGY OPTIMIZATION//STRUCTURAL AND MULTIDISCIPLINARY OPTIMIZATION//LATTICE RULES
4 386 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY//VIDEO CODING//H264 AVC
5 205 MATHEMATICS//JOURNAL OF NUMBER THEORY//ACTA ARITHMETICA
6 621 MEMBRANE COMPUTING//THEORETICAL COMPUTER SCIENCE//LOGIC
7 687 AUXILIARY INFORMATION//PUBLIC OPINION QUARTERLY//SURVEY METHODOLOGY
8 485 LINEAR ALGEBRA AND ITS APPLICATIONS//BENFORDS LAW//MATHEMATICS, APPLIED
9 20 COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, SOFTWARE ENGINEERING
10 90 MATHEMATICAL & COMPUTATIONAL BIOLOGY//BIOINFORMATICS//BMC BIOINFORMATICS

Go to start page