{"id":"https://openalex.org/W4246008820","doi":"https://doi.org/10.1049/iet-ifs:20060099","title":"Plateau characteristics","display_name":"Plateau characteristics","publication_year":2007,"publication_date":"2007-03-12","ids":{"openalex":"https://openalex.org/W4246008820","doi":"https://doi.org/10.1049/iet-ifs:20060099"},"language":"lv","primary_location":{"id":"doi:10.1049/iet-ifs:20060099","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs:20060099","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055847285","display_name":"Joan Daemen","orcid":"https://orcid.org/0000-0002-4102-0775"},"institutions":[{"id":"https://openalex.org/I4210117275","display_name":"STMicroelectronics (Belgium)","ror":"https://ror.org/02km85a12","country_code":"BE","type":"company","lineage":["https://openalex.org/I131827901","https://openalex.org/I4210117275"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"J. Daemen","raw_affiliation_strings":["STMicroelectronics, Excelsiorlaan 44\u201346, B-1930 Zaventem, Belgium"],"affiliations":[{"raw_affiliation_string":"STMicroelectronics, Excelsiorlaan 44\u201346, B-1930 Zaventem, Belgium","institution_ids":["https://openalex.org/I4210117275"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007395243","display_name":"Vincent Rijmen","orcid":"https://orcid.org/0000-0001-7401-2088"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"V. Rijmen","raw_affiliation_strings":["IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Austria"],"affiliations":[{"raw_affiliation_string":"IAIK, Graz University of Technology, Inffeldgasse 16a, A-8010, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5055847285"],"corresponding_institution_ids":["https://openalex.org/I4210117275"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":null,"fwci":1.877,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.8896089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"1","issue":"1","first_page":"11","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plateau","display_name":"Plateau (mathematics)","score":0.7058396935462952},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.6201375722885132},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.07699587941169739}],"concepts":[{"id":"https://openalex.org/C2780030769","wikidata":"https://www.wikidata.org/wiki/Q4968575","display_name":"Plateau (mathematics)","level":2,"score":0.7058396935462952},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.6201375722885132},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.07699587941169739}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1049/iet-ifs:20060099","is_oa":false,"landing_page_url":"https://doi.org/10.1049/iet-ifs:20060099","pdf_url":null,"source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1489027369","https://openalex.org/W1492619099","https://openalex.org/W1492641361","https://openalex.org/W1528065150","https://openalex.org/W1540875416","https://openalex.org/W1569612250","https://openalex.org/W1572032991","https://openalex.org/W1572300106","https://openalex.org/W1629301835","https://openalex.org/W1765803531","https://openalex.org/W1803612032","https://openalex.org/W1887379287","https://openalex.org/W1890290077","https://openalex.org/W1978695162","https://openalex.org/W2027325533","https://openalex.org/W2081451319","https://openalex.org/W2100716505","https://openalex.org/W2109265351","https://openalex.org/W2120464016","https://openalex.org/W2911452795","https://openalex.org/W3030978102","https://openalex.org/W6636396655"],"related_works":["https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W4245490552","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W1587224694","https://openalex.org/W2042127053","https://openalex.org/W2142036596","https://openalex.org/W4238204885"],"abstract_inverted_index":{"Plateau":[0],"characteristics":[1,7,53,71,92],"are":[2,54,77,90],"a":[3,21,30,43,64],"special":[4],"type":[5],"of":[6,25,46,70,83,105],"whose":[8],"probability":[9,32,39,95,104],"depends":[10],"on":[11],"the":[12,26,49,58,67,81,84,100],"key":[13],"and":[14,33,60],"can":[15],"have":[16],"only":[17],"two":[18],"values.":[19],"For":[20,42,57],"(usually":[22],"small)":[23],"subset":[24],"keys":[27,37],"it":[28],"has":[29],"non-zero":[31],"for":[34,86],"all":[35,51],"other":[36,61],"its":[38],"is":[40,108],"zero.":[41],"large":[44],"group":[45],"ciphers,":[47],"including":[48],"AES,":[50,85],"two-round":[52,91,106],"plateau":[55,78],"characteristics.":[56,79],"AES":[59],"ciphers":[62],"with":[63,93],"similar":[65],"structure,":[66],"vast":[68],"majority":[69],"over":[72],"four":[73],"or":[74],"more":[75],"rounds":[76],"In":[80],"case":[82],"most":[87,110],"keys,":[88],"there":[89],"fixed-key":[94],"equal":[96],"to":[97],"32/232,":[98],"whereas":[99],"maximum":[101],"expected":[102],"differential":[103],"differentials":[107],"at":[109],"13.25/232.":[111]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
