Problems and Progressive Cryptanalysis of Prominent Block Ciphers Article Swipe
YOU?
·
· 2020
· Open Access
·
· DOI: https://doi.org/10.71330/nucleus.56.03.1276
Practical cracking of Data Encryption Standard (DES) and mathematical cracking of Advanced Encryption Standard (AES) is seriously questionable despite the fact that AES retains good length of the encryption key, but still all encryption rounds have been cracked mathematically. Therefore, there is a need to revisit the cracking excursion of these well-known cryptosystems to inquire into potential discrepancies associated with them and to evolve the design of future block ciphers. Thus, this study aims to enlighten the cryptanalysis journey of AES and DES, including all DES variants (TDES, DESX and DEX+) to discuss latent weaknesses, issues and problems associated with these block ciphers. To accomplish this review task, quality of related studies was collected from several well-known research repositories and each study was critically analyzed. Earlier review-efforts were found relatively marginal in scope, capacity and are not up-to-date with the latest issues, and cryptanalysis results thereby differ with this work. The resultant discussion shows that known parameters like static substitution, static permutation, fixed block size and repeated encryption rounds with a similar set of encryption operations support the crackers in executing effective cryptanalysis in symmetric block ciphers. Therefore, encrypting the secret data with too many repeated encryption rounds with identical encryption operations is not as effective in enhancing the security of symmetric block cipher as it is usually believed.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.71330/nucleus.56.03.1276
- OA Status
- diamond
- Cited By
- 2
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3006304152
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3006304152Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.71330/nucleus.56.03.1276Digital Object Identifier
- Title
-
Problems and Progressive Cryptanalysis of Prominent Block CiphersWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-09-01Full publication date if available
- Authors
-
Ijaz Ali Shoukat, Umer Iqbal, Muhammad Sheraz Arshad Malik, F. SaherList of authors in order
- Landing page
-
https://doi.org/10.71330/nucleus.56.03.1276Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.71330/nucleus.56.03.1276Direct OA link when available
- Concepts
-
Boomerang attack, Block cipher, Cryptanalysis, Linear cryptanalysis, Impossible differential cryptanalysis, Higher-order differential cryptanalysis, Block (permutation group theory), Computer science, Arithmetic, Algorithm, Mathematics, Cryptography, CombinatoricsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
2Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 1, 2021: 1Per-year citation counts (last 5 years)
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3006304152 |
|---|---|
| doi | https://doi.org/10.71330/nucleus.56.03.1276 |
| ids.doi | https://doi.org/10.71330/nucleus.56.03.1276 |
| ids.mag | 3006304152 |
| ids.openalex | https://openalex.org/W3006304152 |
| fwci | 0.14685955 |
| type | article |
| title | Problems and Progressive Cryptanalysis of Prominent Block Ciphers |
| biblio.issue | 3 |
| biblio.volume | 56 |
| biblio.last_page | 95 |
| biblio.first_page | 86 |
| topics[0].id | https://openalex.org/T10951 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9979000091552734 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptographic Implementations and Security |
| topics[1].id | https://openalex.org/T11130 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9973999857902527 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Coding theory and cryptography |
| topics[2].id | https://openalex.org/T11017 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9945999979972839 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1707 |
| topics[2].subfield.display_name | Computer Vision and Pattern Recognition |
| topics[2].display_name | Chaos-based Image/Signal Encryption |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C147552392 |
| concepts[0].level | 5 |
| concepts[0].score | 0.7341885566711426 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q2869899 |
| concepts[0].display_name | Boomerang attack |
| concepts[1].id | https://openalex.org/C106544461 |
| concepts[1].level | 3 |
| concepts[1].score | 0.7133586406707764 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q543151 |
| concepts[1].display_name | Block cipher |
| concepts[2].id | https://openalex.org/C181149355 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5890006422996521 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q897511 |
| concepts[2].display_name | Cryptanalysis |
| concepts[3].id | https://openalex.org/C82424418 |
| concepts[3].level | 4 |
| concepts[3].score | 0.5761118531227112 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1826463 |
| concepts[3].display_name | Linear cryptanalysis |
| concepts[4].id | https://openalex.org/C120488936 |
| concepts[4].level | 5 |
| concepts[4].score | 0.5378005504608154 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3005748 |
| concepts[4].display_name | Impossible differential cryptanalysis |
| concepts[5].id | https://openalex.org/C151607707 |
| concepts[5].level | 5 |
| concepts[5].score | 0.4837739169597626 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q11673206 |
| concepts[5].display_name | Higher-order differential cryptanalysis |
| concepts[6].id | https://openalex.org/C2777210771 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4667774736881256 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4927124 |
| concepts[6].display_name | Block (permutation group theory) |
| concepts[7].id | https://openalex.org/C41008148 |
| concepts[7].level | 0 |
| concepts[7].score | 0.44671815633773804 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[7].display_name | Computer science |
| concepts[8].id | https://openalex.org/C94375191 |
| concepts[8].level | 1 |
| concepts[8].score | 0.3202829360961914 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q11205 |
| concepts[8].display_name | Arithmetic |
| concepts[9].id | https://openalex.org/C11413529 |
| concepts[9].level | 1 |
| concepts[9].score | 0.23519739508628845 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q8366 |
| concepts[9].display_name | Algorithm |
| concepts[10].id | https://openalex.org/C33923547 |
| concepts[10].level | 0 |
| concepts[10].score | 0.18610501289367676 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[10].display_name | Mathematics |
| concepts[11].id | https://openalex.org/C178489894 |
| concepts[11].level | 2 |
| concepts[11].score | 0.15172463655471802 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[11].display_name | Cryptography |
| concepts[12].id | https://openalex.org/C114614502 |
| concepts[12].level | 1 |
| concepts[12].score | 0.12806978821754456 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q76592 |
| concepts[12].display_name | Combinatorics |
| keywords[0].id | https://openalex.org/keywords/boomerang-attack |
| keywords[0].score | 0.7341885566711426 |
| keywords[0].display_name | Boomerang attack |
| keywords[1].id | https://openalex.org/keywords/block-cipher |
| keywords[1].score | 0.7133586406707764 |
| keywords[1].display_name | Block cipher |
| keywords[2].id | https://openalex.org/keywords/cryptanalysis |
| keywords[2].score | 0.5890006422996521 |
| keywords[2].display_name | Cryptanalysis |
| keywords[3].id | https://openalex.org/keywords/linear-cryptanalysis |
| keywords[3].score | 0.5761118531227112 |
| keywords[3].display_name | Linear cryptanalysis |
| keywords[4].id | https://openalex.org/keywords/impossible-differential-cryptanalysis |
| keywords[4].score | 0.5378005504608154 |
| keywords[4].display_name | Impossible differential cryptanalysis |
| keywords[5].id | https://openalex.org/keywords/higher-order-differential-cryptanalysis |
| keywords[5].score | 0.4837739169597626 |
| keywords[5].display_name | Higher-order differential cryptanalysis |
| keywords[6].id | https://openalex.org/keywords/block |
| keywords[6].score | 0.4667774736881256 |
| keywords[6].display_name | Block (permutation group theory) |
| keywords[7].id | https://openalex.org/keywords/computer-science |
| keywords[7].score | 0.44671815633773804 |
| keywords[7].display_name | Computer science |
| keywords[8].id | https://openalex.org/keywords/arithmetic |
| keywords[8].score | 0.3202829360961914 |
| keywords[8].display_name | Arithmetic |
| keywords[9].id | https://openalex.org/keywords/algorithm |
| keywords[9].score | 0.23519739508628845 |
| keywords[9].display_name | Algorithm |
| keywords[10].id | https://openalex.org/keywords/mathematics |
| keywords[10].score | 0.18610501289367676 |
| keywords[10].display_name | Mathematics |
| keywords[11].id | https://openalex.org/keywords/cryptography |
| keywords[11].score | 0.15172463655471802 |
| keywords[11].display_name | Cryptography |
| keywords[12].id | https://openalex.org/keywords/combinatorics |
| keywords[12].score | 0.12806978821754456 |
| keywords[12].display_name | Combinatorics |
| language | en |
| locations[0].id | doi:10.71330/nucleus.56.03.1276 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S5406925863 |
| locations[0].source.issn | 0029-5698, 2306-6539 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 0029-5698 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | The Nucleus |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | The Nucleus |
| locations[0].landing_page_url | https://doi.org/10.71330/nucleus.56.03.1276 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5040256864 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-2456-6952 |
| authorships[0].author.display_name | Ijaz Ali Shoukat |
| authorships[0].countries | PK |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[0].affiliations[0].raw_affiliation_string | Riphah International University, Faisalabad Campus. |
| authorships[0].institutions[0].id | https://openalex.org/I195024194 |
| authorships[0].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[0].institutions[0].country_code | PK |
| authorships[0].institutions[0].display_name | Riphah International University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | I. A. Shoukat |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Riphah International University, Faisalabad Campus. |
| authorships[1].author.id | https://openalex.org/A5083535368 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-2888-9919 |
| authorships[1].author.display_name | Umer Iqbal |
| authorships[1].countries | PK |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[1].affiliations[0].raw_affiliation_string | Riphah International University, Faisalabad Campus. |
| authorships[1].institutions[0].id | https://openalex.org/I195024194 |
| authorships[1].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[1].institutions[0].country_code | PK |
| authorships[1].institutions[0].display_name | Riphah International University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | U. Iqbal |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Riphah International University, Faisalabad Campus. |
| authorships[2].author.id | https://openalex.org/A5038265911 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-0944-6362 |
| authorships[2].author.display_name | Muhammad Sheraz Arshad Malik |
| authorships[2].countries | PK |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I194348271 |
| authorships[2].affiliations[0].raw_affiliation_string | Government College University Faisalabad |
| authorships[2].institutions[0].id | https://openalex.org/I194348271 |
| authorships[2].institutions[0].ror | https://ror.org/051zgra59 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I194348271 |
| authorships[2].institutions[0].country_code | PK |
| authorships[2].institutions[0].display_name | Government College University, Faisalabad |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | M.S. A. Malik |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Government College University Faisalabad |
| authorships[3].author.id | https://openalex.org/A5081976229 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | F. Saher |
| authorships[3].countries | PK |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I195024194 |
| authorships[3].affiliations[0].raw_affiliation_string | Riphah International University, Faisalabad Campus. |
| authorships[3].institutions[0].id | https://openalex.org/I195024194 |
| authorships[3].institutions[0].ror | https://ror.org/02kdm5630 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I195024194 |
| authorships[3].institutions[0].country_code | PK |
| authorships[3].institutions[0].display_name | Riphah International University |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | F. Saher |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Riphah International University, Faisalabad Campus. |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.71330/nucleus.56.03.1276 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Problems and Progressive Cryptanalysis of Prominent Block Ciphers |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10951 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9979000091552734 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptographic Implementations and Security |
| related_works | https://openalex.org/W2557174342, https://openalex.org/W2791274315, https://openalex.org/W2950215720, https://openalex.org/W4230315357, https://openalex.org/W2083383916, https://openalex.org/W1536590213, https://openalex.org/W2026284256, https://openalex.org/W2786560893, https://openalex.org/W1574936599, https://openalex.org/W4385434343 |
| cited_by_count | 2 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.71330/nucleus.56.03.1276 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S5406925863 |
| best_oa_location.source.issn | 0029-5698, 2306-6539 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 0029-5698 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | The Nucleus |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | The Nucleus |
| best_oa_location.landing_page_url | https://doi.org/10.71330/nucleus.56.03.1276 |
| primary_location.id | doi:10.71330/nucleus.56.03.1276 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S5406925863 |
| primary_location.source.issn | 0029-5698, 2306-6539 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 0029-5698 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | The Nucleus |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | The Nucleus |
| primary_location.landing_page_url | https://doi.org/10.71330/nucleus.56.03.1276 |
| publication_date | 2020-09-01 |
| publication_year | 2020 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 42, 170 |
| abstract_inverted_index.To | 103 |
| abstract_inverted_index.as | 204, 214 |
| abstract_inverted_index.in | 131, 179, 183, 206 |
| abstract_inverted_index.is | 15, 41, 202, 216 |
| abstract_inverted_index.it | 215 |
| abstract_inverted_index.of | 2, 10, 26, 49, 66, 79, 109, 173, 210 |
| abstract_inverted_index.to | 44, 53, 62, 74, 91 |
| abstract_inverted_index.AES | 22, 80 |
| abstract_inverted_index.DES | 85 |
| abstract_inverted_index.The | 150 |
| abstract_inverted_index.all | 32, 84 |
| abstract_inverted_index.and | 7, 61, 81, 89, 96, 119, 134, 142, 165 |
| abstract_inverted_index.are | 135 |
| abstract_inverted_index.but | 30 |
| abstract_inverted_index.not | 136, 203 |
| abstract_inverted_index.set | 172 |
| abstract_inverted_index.the | 19, 27, 46, 64, 76, 139, 177, 189, 208 |
| abstract_inverted_index.too | 193 |
| abstract_inverted_index.was | 112, 122 |
| abstract_inverted_index.DES, | 82 |
| abstract_inverted_index.DESX | 88 |
| abstract_inverted_index.Data | 3 |
| abstract_inverted_index.aims | 73 |
| abstract_inverted_index.been | 36 |
| abstract_inverted_index.data | 191 |
| abstract_inverted_index.each | 120 |
| abstract_inverted_index.fact | 20 |
| abstract_inverted_index.from | 114 |
| abstract_inverted_index.good | 24 |
| abstract_inverted_index.have | 35 |
| abstract_inverted_index.into | 55 |
| abstract_inverted_index.key, | 29 |
| abstract_inverted_index.like | 157 |
| abstract_inverted_index.many | 194 |
| abstract_inverted_index.need | 43 |
| abstract_inverted_index.size | 164 |
| abstract_inverted_index.that | 21, 154 |
| abstract_inverted_index.them | 60 |
| abstract_inverted_index.this | 71, 105, 148 |
| abstract_inverted_index.were | 127 |
| abstract_inverted_index.with | 59, 99, 138, 147, 169, 192, 198 |
| abstract_inverted_index.(AES) | 14 |
| abstract_inverted_index.(DES) | 6 |
| abstract_inverted_index.DEX+) | 90 |
| abstract_inverted_index.Thus, | 70 |
| abstract_inverted_index.block | 68, 101, 163, 185, 212 |
| abstract_inverted_index.fixed | 162 |
| abstract_inverted_index.found | 128 |
| abstract_inverted_index.known | 155 |
| abstract_inverted_index.shows | 153 |
| abstract_inverted_index.still | 31 |
| abstract_inverted_index.study | 72, 121 |
| abstract_inverted_index.task, | 107 |
| abstract_inverted_index.there | 40 |
| abstract_inverted_index.these | 50, 100 |
| abstract_inverted_index.work. | 149 |
| abstract_inverted_index.(TDES, | 87 |
| abstract_inverted_index.cipher | 213 |
| abstract_inverted_index.design | 65 |
| abstract_inverted_index.differ | 146 |
| abstract_inverted_index.evolve | 63 |
| abstract_inverted_index.future | 67 |
| abstract_inverted_index.issues | 95 |
| abstract_inverted_index.latent | 93 |
| abstract_inverted_index.latest | 140 |
| abstract_inverted_index.length | 25 |
| abstract_inverted_index.review | 106 |
| abstract_inverted_index.rounds | 34, 168, 197 |
| abstract_inverted_index.scope, | 132 |
| abstract_inverted_index.secret | 190 |
| abstract_inverted_index.static | 158, 160 |
| abstract_inverted_index.Earlier | 125 |
| abstract_inverted_index.cracked | 37 |
| abstract_inverted_index.despite | 18 |
| abstract_inverted_index.discuss | 92 |
| abstract_inverted_index.inquire | 54 |
| abstract_inverted_index.issues, | 141 |
| abstract_inverted_index.journey | 78 |
| abstract_inverted_index.quality | 108 |
| abstract_inverted_index.related | 110 |
| abstract_inverted_index.results | 144 |
| abstract_inverted_index.retains | 23 |
| abstract_inverted_index.revisit | 45 |
| abstract_inverted_index.several | 115 |
| abstract_inverted_index.similar | 171 |
| abstract_inverted_index.studies | 111 |
| abstract_inverted_index.support | 176 |
| abstract_inverted_index.thereby | 145 |
| abstract_inverted_index.usually | 217 |
| abstract_inverted_index.Advanced | 11 |
| abstract_inverted_index.Standard | 5, 13 |
| abstract_inverted_index.capacity | 133 |
| abstract_inverted_index.ciphers. | 69, 102, 186 |
| abstract_inverted_index.crackers | 178 |
| abstract_inverted_index.cracking | 1, 9, 47 |
| abstract_inverted_index.marginal | 130 |
| abstract_inverted_index.problems | 97 |
| abstract_inverted_index.repeated | 166, 195 |
| abstract_inverted_index.research | 117 |
| abstract_inverted_index.security | 209 |
| abstract_inverted_index.variants | 86 |
| abstract_inverted_index.Practical | 0 |
| abstract_inverted_index.analyzed. | 124 |
| abstract_inverted_index.believed. | 218 |
| abstract_inverted_index.collected | 113 |
| abstract_inverted_index.effective | 181, 205 |
| abstract_inverted_index.enhancing | 207 |
| abstract_inverted_index.enlighten | 75 |
| abstract_inverted_index.excursion | 48 |
| abstract_inverted_index.executing | 180 |
| abstract_inverted_index.identical | 199 |
| abstract_inverted_index.including | 83 |
| abstract_inverted_index.potential | 56 |
| abstract_inverted_index.resultant | 151 |
| abstract_inverted_index.seriously | 16 |
| abstract_inverted_index.symmetric | 184, 211 |
| abstract_inverted_index.Encryption | 4, 12 |
| abstract_inverted_index.Therefore, | 39, 187 |
| abstract_inverted_index.accomplish | 104 |
| abstract_inverted_index.associated | 58, 98 |
| abstract_inverted_index.critically | 123 |
| abstract_inverted_index.discussion | 152 |
| abstract_inverted_index.encrypting | 188 |
| abstract_inverted_index.encryption | 28, 33, 167, 174, 196, 200 |
| abstract_inverted_index.operations | 175, 201 |
| abstract_inverted_index.parameters | 156 |
| abstract_inverted_index.relatively | 129 |
| abstract_inverted_index.up-to-date | 137 |
| abstract_inverted_index.well-known | 51, 116 |
| abstract_inverted_index.weaknesses, | 94 |
| abstract_inverted_index.mathematical | 8 |
| abstract_inverted_index.permutation, | 161 |
| abstract_inverted_index.questionable | 17 |
| abstract_inverted_index.repositories | 118 |
| abstract_inverted_index.cryptanalysis | 77, 143, 182 |
| abstract_inverted_index.cryptosystems | 52 |
| abstract_inverted_index.discrepancies | 57 |
| abstract_inverted_index.substitution, | 159 |
| abstract_inverted_index.review-efforts | 126 |
| abstract_inverted_index.mathematically. | 38 |
| cited_by_percentile_year.max | 94 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.51979894 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |