{"id":"https://openalex.org/W2072771565","doi":"https://doi.org/10.1080/01611190600947806","title":"Cracking Matrix Encryption Row by Row","display_name":"Cracking Matrix Encryption Row by Row","publication_year":2007,"publication_date":"2007-01-01","ids":{"openalex":"https://openalex.org/W2072771565","doi":"https://doi.org/10.1080/01611190600947806","mag":"2072771565"},"language":"en","primary_location":{"id":"doi:10.1080/01611190600947806","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611190600947806","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063562034","display_name":"Craig P. Bauer","orcid":null},"institutions":[{"id":"https://openalex.org/I3130081645","display_name":"Yangon University of Economics","ror":"https://ror.org/0133h5567","country_code":"MM","type":"education","lineage":["https://openalex.org/I3130081645"]}],"countries":["MM"],"is_corresponding":true,"raw_author_name":"Craig Bauer","raw_affiliation_strings":["Correspondencecbauer@ycp.edu"],"affiliations":[{"raw_affiliation_string":"Correspondencecbauer@ycp.edu","institution_ids":["https://openalex.org/I3130081645"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073149778","display_name":"Katherine Millward","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Katherine Millward","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063562034"],"corresponding_institution_ids":["https://openalex.org/I3130081645"],"apc_list":null,"apc_paid":null,"fwci":0.9387,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.81614027,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"31","issue":"1","first_page":"76","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6515224575996399},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6503061056137085},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5972899794578552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5819836854934692},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.5685126781463623},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.49327415227890015},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.4882843494415283},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.4701314866542816},{"id":"https://openalex.org/keywords/transposition-cipher","display_name":"Transposition cipher","score":0.46808820962905884},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.4591358006000519},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.442534863948822},{"id":"https://openalex.org/keywords/brute-force-attack","display_name":"Brute-force attack","score":0.4364873766899109},{"id":"https://openalex.org/keywords/running-key-cipher","display_name":"Running key cipher","score":0.4099099040031433},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.36348095536231995},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.31634533405303955},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2857751250267029},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2228803038597107}],"concepts":[{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6515224575996399},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6503061056137085},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5972899794578552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5819836854934692},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.5685126781463623},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.49327415227890015},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.4882843494415283},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.4701314866542816},{"id":"https://openalex.org/C71247151","wikidata":"https://www.wikidata.org/wiki/Q840498","display_name":"Transposition cipher","level":5,"score":0.46808820962905884},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.4591358006000519},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.442534863948822},{"id":"https://openalex.org/C207468940","wikidata":"https://www.wikidata.org/wiki/Q869370","display_name":"Brute-force attack","level":3,"score":0.4364873766899109},{"id":"https://openalex.org/C64119674","wikidata":"https://www.wikidata.org/wiki/Q7380031","display_name":"Running key cipher","level":4,"score":0.4099099040031433},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.36348095536231995},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.31634533405303955},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2857751250267029},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2228803038597107},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01611190600947806","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611190600947806","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education","score":0.6499999761581421}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2022461859","https://openalex.org/W2058844560","https://openalex.org/W2085316699","https://openalex.org/W2324837312","https://openalex.org/W2331311907","https://openalex.org/W4205295188","https://openalex.org/W4235864901","https://openalex.org/W4246448514","https://openalex.org/W4255935838"],"related_works":["https://openalex.org/W4210550009","https://openalex.org/W3028629590","https://openalex.org/W1697947684","https://openalex.org/W2806700897","https://openalex.org/W3004557383","https://openalex.org/W3154315844","https://openalex.org/W2183611273","https://openalex.org/W4387233761","https://openalex.org/W2940192807","https://openalex.org/W2175391158"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"Hill":[2,96],"Cipher,":[3],"also":[4],"known":[5],"as":[6,19],"matrix":[7,147],"encryption,":[8],"uses":[9],"matrices":[10],"to":[11,36],"encipher":[12],"and":[13,89,135],"decipher":[14],"text.":[15],"Various":[16],"attacks,":[17],"such":[18],"those":[20],"found":[21],"by":[22],"Jack":[23],"Levine":[24,26,56,86],"[2":[25],",":[27,48,57,70,82,87,107,119],"J.":[28,58,88],"1961":[29,59],".":[30,60,92,94],"\u201cSome":[31,61],"Applications":[32],"of":[33,42,46,64,145,152,159],"High-Speed":[34],"Computers":[35],"the":[37,143,146,157],"Case":[38],"n":[39],"=":[40],"2":[41],"Algebraic":[43,65],"Cryptography,\u201d":[44,66],"Mathematics":[45],"Computation":[47],"15":[49],"(":[50,72,109],"75":[51],").":[52],"[Google":[53,83,120],"Scholar]":[54,84],"3":[55],"Elementary":[62],"Cryptanalysis":[63],"American":[67],"Mathematical":[68],"Monthly":[69],"68":[71],"5":[73,85],"):":[74,111],"411":[75],"\u2013":[76,113],"418":[77],".[Taylor":[78,115],"&":[79,116],"Francis":[80,117],"Online]":[81,118],"R.":[90],"Chandler":[91],"1989":[93],"\u201cThe":[95],"Cryptographic":[97],"System":[98],"with":[99],"Unknown":[100],"Cipher":[101],"Alphabet":[102],"but":[103],"Known":[104],"Plaintext,\u201d":[105],"Cryptologia":[106],"13":[108],"1":[110,112],"28":[114],"Scholar]],":[121],"have":[122],"been":[123],"published":[124],"for":[125,162],"this":[126],"system.":[127],"This":[128],"article":[129],"reviews":[130],"a":[131,137],"few":[132],"previous":[133],"results":[134],"presents":[136],"powerful":[138],"new":[139],"attack":[140],"in":[141],"which":[142],"rows":[144],"can":[148],"be":[149],"determined":[150],"independent":[151],"one":[153],"another,":[154],"greatly":[155],"reducing":[156],"amount":[158],"time":[160],"needed":[161],"decipherment.":[163]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
