{"id":"https://openalex.org/W2577803874","doi":"https://doi.org/10.1090/dimacs/044/02","title":"On applying molecular computation to the data encryption standard","display_name":"On applying molecular computation to the data encryption standard","publication_year":1998,"publication_date":"1998-10-19","ids":{"openalex":"https://openalex.org/W2577803874","doi":"https://doi.org/10.1090/dimacs/044/02","mag":"2577803874"},"language":"en","primary_location":{"id":"doi:10.1090/dimacs/044/02","is_oa":false,"landing_page_url":"https://doi.org/10.1090/dimacs/044/02","pdf_url":null,"source":{"id":"https://openalex.org/S4210177973","display_name":"DIMACS series in discrete mathematics and theoretical computer science","issn_l":"1052-1798","issn":["1052-1798","2472-4793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"DIMACS Series in Discrete Mathematics and\n                        Theoretical Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048720314","display_name":"Leonard M. Adleman","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Leonard Adleman","raw_affiliation_strings":["Department of Computer Science,  University of Southern California,  Los Angeles,  90089,  USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science,  University of Southern California,  Los Angeles,  90089,  USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016860712","display_name":"Paul W. K. Rothemund","orcid":"https://orcid.org/0000-0002-1653-3202"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paul Rothemund","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003010184","display_name":"Sam T. Roweis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sam Roweis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5000956443","display_name":"Erik Winfree","orcid":"https://orcid.org/0000-0002-5899-7523"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Erik Winfree","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048720314"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":3.26,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.9251714,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"31","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6212397813796997},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6099491715431213},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5143840909004211},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24334394931793213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15921127796173096}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6212397813796997},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6099491715431213},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5143840909004211},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24334394931793213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15921127796173096}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1090/dimacs/044/02","is_oa":false,"landing_page_url":"https://doi.org/10.1090/dimacs/044/02","pdf_url":null,"source":{"id":"https://openalex.org/S4210177973","display_name":"DIMACS series in discrete mathematics and theoretical computer science","issn_l":"1052-1798","issn":["1052-1798","2472-4793"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"DIMACS Series in Discrete Mathematics and\n                        Theoretical Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880","https://openalex.org/W1596801655"],"abstract_inverted_index":{"Recently,":[0],"Boneh,":[1],"Dunworth,":[2],"and":[3,58],"Lipton":[4],"(1996)":[5],"described":[6],"the":[7,15,32,63],"potential":[8],"use":[9],"of":[10,27,35,56,65,69],"molecular":[11,36],"computation":[12],"in":[13,62],"attacking":[14],"United":[16],"States":[17],"Data":[18],"Encryption":[19],"Standard":[20],"(DES).":[21],"Here,":[22],"we":[23],"provide":[24],"a":[25,49,54,66],"description":[26],"such":[28,42],"an":[29,43],"attack":[30,44],"using":[31,52],"sticker":[33],"model":[34],"computation.":[37],"Our":[38],"analysis":[39],"suggests":[40],"that":[41],"might":[45,59],"be":[46],"mounted":[47],"on":[48],"tabletop":[50],"machine":[51],"approximately":[53],"gram":[55],"DNA":[57],"succeed":[60],"even":[61],"presence":[64],"large":[67],"number":[68],"errors.":[70]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2026-03-10T14:07:55.174380","created_date":"2025-10-10T00:00:00"}
