{"id":"https://openalex.org/W2034214665","doi":"https://doi.org/10.1080/0161-110391891946","title":"CLAUDE COMIERS: THE FIRST ARITHMETICAL CRYPTOGRAPHY","display_name":"CLAUDE COMIERS: THE FIRST ARITHMETICAL CRYPTOGRAPHY","publication_year":2003,"publication_date":"2003-10-01","ids":{"openalex":"https://openalex.org/W2034214665","doi":"https://doi.org/10.1080/0161-110391891946","mag":"2034214665"},"language":"en","primary_location":{"id":"doi:10.1080/0161-110391891946","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0161-110391891946","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111464444","display_name":"Joachim von zur Gathen","orcid":null},"institutions":[{"id":"https://openalex.org/I206945453","display_name":"Paderborn University","ror":"https://ror.org/058kzsd48","country_code":"DE","type":"education","lineage":["https://openalex.org/I206945453"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Joachim von zur Gathen","raw_affiliation_strings":["Fakult\u00e4t f\u00fcr Elektrotechnik, Informatik, Mathematik, Universitat Paderborn, D-33095 Paderborn GERMANY, gathen@upb.de"],"affiliations":[{"raw_affiliation_string":"Fakult\u00e4t f\u00fcr Elektrotechnik, Informatik, Mathematik, Universitat Paderborn, D-33095 Paderborn GERMANY, gathen@upb.de","institution_ids":["https://openalex.org/I206945453"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5111464444"],"corresponding_institution_ids":["https://openalex.org/I206945453"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.25687309,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":"4","first_page":"339","last_page":"349"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12170","display_name":"History and Theory of Mathematics","score":0.9779999852180481,"subfield":{"id":"https://openalex.org/subfields/2614","display_name":"Theoretical Computer Science"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13156","display_name":"Historical Linguistics and Language Studies","score":0.9016000032424927,"subfield":{"id":"https://openalex.org/subfields/1203","display_name":"Language and Linguistics"},"field":{"id":"https://openalex.org/fields/12","display_name":"Arts and Humanities"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.7096962928771973},{"id":"https://openalex.org/keywords/arithmetic-function","display_name":"Arithmetic function","score":0.6768988370895386},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.6309012174606323},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6089717745780945},{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.6005693078041077},{"id":"https://openalex.org/keywords/modular-arithmetic","display_name":"Modular arithmetic","score":0.5781951546669006},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5731346011161804},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47337621450424194},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43773597478866577},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4344017803668976},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.3427298665046692},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.3424776792526245},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23760271072387695},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18300014734268188},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15722781419754028},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.09762218594551086}],"concepts":[{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.7096962928771973},{"id":"https://openalex.org/C112343008","wikidata":"https://www.wikidata.org/wiki/Q140744","display_name":"Arithmetic function","level":2,"score":0.6768988370895386},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.6309012174606323},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6089717745780945},{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.6005693078041077},{"id":"https://openalex.org/C32049820","wikidata":"https://www.wikidata.org/wiki/Q319400","display_name":"Modular arithmetic","level":3,"score":0.5781951546669006},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5731346011161804},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47337621450424194},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43773597478866577},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4344017803668976},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.3427298665046692},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3424776792526245},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23760271072387695},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18300014734268188},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15722781419754028},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.09762218594551086}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/0161-110391891946","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0161-110391891946","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2936027227","https://openalex.org/W2910586303","https://openalex.org/W2980642877","https://openalex.org/W4297494787","https://openalex.org/W4223601134","https://openalex.org/W1565128838","https://openalex.org/W2949316140","https://openalex.org/W2333771478","https://openalex.org/W2391199417","https://openalex.org/W2022545730"],"abstract_inverted_index":{"In":[0],"1690,":[1],"the":[2,9,18,21,45],"blind":[3],"French":[4],"author":[5],"Claude":[6],"Comiers":[7,33],"described":[8],"Vigen\u00e9re":[10],"cipher":[11],"as":[12],"addition":[13],"of":[14,26,37,48],"a":[15,49],"key":[16],"to":[17,43],"plaintext,":[19],"modulo":[20],"alphabet":[22],"size.":[23],"The":[24],"concept":[25],"modular":[27],"arithmetic":[28,52],"was":[29,34],"then":[30],"unknown,":[31],"but":[32],"well":[35],"aware":[36],"its":[38],"cyclic":[39],"nature.":[40],"This":[41],"seems":[42],"be":[44],"earliest":[46],"description":[47],"cryptosystem":[50],"in":[51],"terms.":[53]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
