{"id":"https://openalex.org/W2088944771","doi":"https://doi.org/10.1080/0161-118691861029","title":"FOILING THE KNOWN-PLAINTEXT ATTACK","display_name":"FOILING THE KNOWN-PLAINTEXT ATTACK","publication_year":1986,"publication_date":"1986-10-01","ids":{"openalex":"https://openalex.org/W2088944771","doi":"https://doi.org/10.1080/0161-118691861029","mag":"2088944771"},"language":"en","primary_location":{"id":"doi:10.1080/0161-118691861029","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0161-118691861029","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077326122","display_name":"Frank Rubin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"FRANK RUBIN","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5077326122"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17554138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"10","issue":"4","first_page":"217","last_page":"223"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/character","display_name":"Character (mathematics)","score":0.8689225316047668},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7857447862625122},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.6085463166236877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5771632790565491},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4827527403831482},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4217013716697693},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.4198574721813202},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.40755191445350647},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3319006562232971},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.32274317741394043},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2655062973499298},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.056288331747055054}],"concepts":[{"id":"https://openalex.org/C2780861071","wikidata":"https://www.wikidata.org/wiki/Q1062934","display_name":"Character (mathematics)","level":2,"score":0.8689225316047668},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7857447862625122},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.6085463166236877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5771632790565491},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4827527403831482},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4217013716697693},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.4198574721813202},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.40755191445350647},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3319006562232971},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.32274317741394043},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2655062973499298},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.056288331747055054},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/0161-118691861029","is_oa":false,"landing_page_url":"https://doi.org/10.1080/0161-118691861029","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2083781982","https://openalex.org/W3089223619","https://openalex.org/W4288849478","https://openalex.org/W2940752727","https://openalex.org/W2281112860","https://openalex.org/W2048539412","https://openalex.org/W3092327956","https://openalex.org/W1561797008","https://openalex.org/W1986773466","https://openalex.org/W1730698658"],"abstract_inverted_index":{"Three":[0],"methods":[1],"for":[2,31],"hindering":[3],"a":[4,8],"known-plaintext":[5],"attack":[6],"on":[7],"DES":[9],"or":[10],"LFSR":[11],"encipherment":[12],"are":[13],"considered:":[14],"replacing":[15,69],"message":[16,54],"characters":[17,23,41,70],"by":[18],"random":[19,22,40],"characters,":[20],"inserting":[21],"into":[24],"the":[25,29,43,50,58],"message,":[26],"and":[27,64],"choosing":[28,57],"representation":[30,60],"each":[32],"character":[33,59],"randomly":[34],"from":[35],"multiple":[36],"representations":[37],"provided.":[38],"Inserting":[39],"gives":[42],"highest":[44],"level":[45],"of":[46,52],"security,":[47],"but":[48],"at":[49],"expense":[51],"increasing":[53],"length.":[55],"Randomly":[56],"avoids":[61],"this":[62],"problem,":[63],"has":[65],"higher":[66],"security":[67],"than":[68],"randomly.":[71]},"counts_by_year":[{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
