{"id":"https://openalex.org/W2071381324","doi":"https://doi.org/10.1007/bf00204799","title":"Pairs and triplets of DES S-boxes","display_name":"Pairs and triplets of DES S-boxes","publication_year":1995,"publication_date":"1995-12-01","ids":{"openalex":"https://openalex.org/W2071381324","doi":"https://doi.org/10.1007/bf00204799","mag":"2071381324"},"language":"de","primary_location":{"id":"doi:10.1007/bf00204799","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf00204799","pdf_url":null,"source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110877121","display_name":"D. W. Davies","orcid":null},"institutions":[{"id":"https://openalex.org/I124357947","display_name":"University of London","ror":"https://ror.org/04cw6st05","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947"]},{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"D. Davies","raw_affiliation_strings":["Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#","institution_ids":["https://openalex.org/I124357947"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061053285","display_name":"Se\u00e1n Murphy","orcid":"https://orcid.org/0000-0002-6582-4065"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]},{"id":"https://openalex.org/I124357947","display_name":"University of London","ror":"https://ror.org/04cw6st05","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"S. Murphy","raw_affiliation_strings":["Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#"],"affiliations":[{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, TW20 0EX, Egham, Surrey, England","institution_ids":["https://openalex.org/I184558857"]},{"raw_affiliation_string":"Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, England TW20 0EX#TAB#","institution_ids":["https://openalex.org/I124357947"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110877121"],"corresponding_institution_ids":["https://openalex.org/I124357947","https://openalex.org/I184558857"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":2.3045,"has_fulltext":false,"cited_by_count":63,"citation_normalized_percentile":{"value":0.8928972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"8","issue":"1","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13720","display_name":"Benford\u2019s Law and Fraud Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/2613","display_name":"Statistics and Probability"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.6468383073806763},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6011651158332825},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5697044134140015},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4993467330932617},{"id":"https://openalex.org/keywords/weakness","display_name":"Weakness","score":0.47981002926826477},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47437483072280884},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4423706531524658},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.41486018896102905},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3709229826927185},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3557307720184326},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32337072491645813},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21483436226844788},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.1374996304512024},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.0639188289642334},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.04852321743965149}],"concepts":[{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.6468383073806763},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6011651158332825},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5697044134140015},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4993467330932617},{"id":"https://openalex.org/C2780247198","wikidata":"https://www.wikidata.org/wiki/Q633403","display_name":"Weakness","level":2,"score":0.47981002926826477},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47437483072280884},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4423706531524658},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.41486018896102905},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3709229826927185},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3557307720184326},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32337072491645813},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21483436226844788},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.1374996304512024},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0639188289642334},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.04852321743965149},{"id":"https://openalex.org/C105702510","wikidata":"https://www.wikidata.org/wiki/Q514","display_name":"Anatomy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/bf00204799","is_oa":false,"landing_page_url":"https://doi.org/10.1007/bf00204799","pdf_url":null,"source":{"id":"https://openalex.org/S190936789","display_name":"Journal of Cryptology","issn_l":"0933-2790","issn":["0933-2790","1432-1378"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.62.8340","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.8340","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.isg.rhul.ac.uk/~sean/box23.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1527545029","https://openalex.org/W2199322517","https://openalex.org/W2798593669","https://openalex.org/W4205895259","https://openalex.org/W4244526140","https://openalex.org/W6750605398"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4310649982","https://openalex.org/W2011667854","https://openalex.org/W1589129854","https://openalex.org/W2802117553","https://openalex.org/W2939324531","https://openalex.org/W4294104609","https://openalex.org/W3042758862"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
