{"entities":{"Q2811215":{"pageid":2821953,"ns":120,"title":"Item:Q2811215","lastrevid":83333285,"modified":"2026-05-07T07:15:41Z","type":"item","id":"Q2811215","labels":{"en":{"language":"en","value":"Leakage squeezing using cellular automata and its application to scan attack"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 6591603"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2811215$36927DCD-25BA-4CC6-A06A-6231F13ADF41","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"38b03e33ecdbb7bbc1745586f68ba0e1a9eb8fff","datavalue":{"value":"1338.94075","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2811215$B28C838D-CF6E-4475-B99F-00C87D64DDD9","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"7e9af90226b482a01318369dbee8abc40efa200d","datavalue":{"value":{"entity-type":"item","numeric-id":2811214,"id":"Q2811214"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2811215$481C0F7E-17CD-45D5-A9C2-A71A2B2B2B90","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P16","hash":"cf9b851a44e707de8c749ba50a61c924288d2154","datavalue":{"value":{"entity-type":"item","numeric-id":1007296,"id":"Q1007296"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2811215$676DD077-E543-45F9-A61B-89517819032E","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"8e972b30c5e72787e282a33f718cd738a1fcdeeb","datavalue":{"value":{"time":"+2016-06-10T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2811215$B9236941-E0BC-40C1-9421-F3BAA14B45D6","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"d461fa6a2f62ca08e2f592f31cae880915aea431","datavalue":{"value":"http://www.oldcitypublishing.com/journals/jca-home/jca-issue-contents/jca-volume-9-number-5-6-2014/jca-9-5-6-p-417-436","type":"string"},"datatype":"url"},"type":"statement","id":"Q2811215$EF57DC51-3143-4EAA-860A-E5E3897B3725","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2811215$7F5F0CE3-0623-4502-AF3D-2A2E88652C25","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P226","hash":"a8ad18899f7daee4ed2b96373381fb2ababe12b4","datavalue":{"value":"68Q80","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2811215$A0C8B8CD-239C-404E-A54B-305DC3A75145","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"0a4f8c4f6187bf7ca43b0c6d6461d36544d5e35c","datavalue":{"value":"6591603","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2811215$D4AB2924-1A7E-4B47-AAC0-0AF93F7ECB9B","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"0d0fc5e802904114cb9dd38e62a51055dffcd35a","datavalue":{"value":"leakage squeezing","type":"string"},"datatype":"string"},"type":"statement","id":"Q2811215$C4EAE39E-9D26-4A92-AA1C-E1F33A71B3FB","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"fc4b5d63289db850b148e760ad6fea530c4e5631","datavalue":{"value":"cellular automata","type":"string"},"datatype":"string"},"type":"statement","id":"Q2811215$1E0033B5-84C3-4CED-94C4-6694BA12C160","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"85ef77b8fa1acdacdf0f86d0a144cccace720fac","datavalue":{"value":"nonlinear cellular automata","type":"string"},"datatype":"string"},"type":"statement","id":"Q2811215$8AAA676F-31FD-4972-8A9A-D6AC7F52733E","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"c116840f7e81cee8a3039a8e0afb398234d4f644","datavalue":{"value":"hybrid nonlinear cellular automata","type":"string"},"datatype":"string"},"type":"statement","id":"Q2811215$8230CE15-46DE-4D13-89F6-805E2103C935","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2811215$7CCAECEA-48A8-4175-84D4-AE3A647F55E7","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"22c4086163508c1586e3f5347f73ba2db268bbaa","datavalue":{"value":{"text":"Leakage squeezing using cellular automata and its application to scan attack","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2811215$C67EA673-A209-435D-AF82-D4592A3CA480","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"98eb1c7055a4c81ff36adb0cc42b28d701423296","datavalue":{"value":{"entity-type":"item","numeric-id":6771490,"id":"Q6771490"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2811215$52AF3228-238E-4CC1-948F-5AC3DBF357CB","rank":"normal"}],"P1643":[{"mainsnak":{"snaktype":"value","property":"P1643","hash":"9964cfd85c423ac654c2aaa9fb75688e7d215794","datavalue":{"value":{"entity-type":"item","numeric-id":2851303,"id":"Q2851303"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"e667fcd5f6c85d69c51261f7f3429dc5ba8d4f58","datavalue":{"value":{"amount":"+0.9044792652130128","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2811215$6F83E24B-9C71-4FF6-B193-4DAC29A17044","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"57b1edd53fa7ad609ab4b9e97e31f121c56deb02","datavalue":{"value":{"entity-type":"item","numeric-id":742019,"id":"Q742019"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"373bf9878904ec1ce6788b2721de6e27a0f7ab76","datavalue":{"value":{"amount":"+0.7537939548492432","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2811215$41EE39D4-4853-49A7-B971-825308F26FCF","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"16a116f5c9ef79a16f8a72c6a76f6aad6a0da94a","datavalue":{"value":{"entity-type":"item","numeric-id":2876927,"id":"Q2876927"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"d510b6c3a640baa13150e067b05bdf3814aa089b","datavalue":{"value":{"amount":"+0.7523374557495117","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2811215$59706894-FF7B-438F-9652-CE7ED584EFD3","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"52386ed8e8ee776e293e2d0f8b51797c8d729991","datavalue":{"value":{"entity-type":"item","numeric-id":5504625,"id":"Q5504625"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"04c3ea00edabd6243845330b2ee254a334ef4240","datavalue":{"value":{"amount":"+0.6918046474456787","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2811215$678CCE14-9A43-47C1-887F-9B742A14CBE2","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1643","hash":"df7690c1d7604f2018171b133eafcba90d449c6c","datavalue":{"value":{"entity-type":"item","numeric-id":5168549,"id":"Q5168549"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","qualifiers":{"P1659":[{"snaktype":"value","property":"P1659","hash":"64976c648428448598981de54c369d734ec309d3","datavalue":{"value":{"amount":"+0.6890129446983337","unit":"1"},"type":"quantity"},"datatype":"quantity"}],"P1660":[{"snaktype":"value","property":"P1660","hash":"a327a09ea0305e98d5cf33bd4036320e19f2aed0","datavalue":{"value":{"entity-type":"item","numeric-id":6821328,"id":"Q6821328"},"type":"wikibase-entityid"},"datatype":"wikibase-item"}]},"qualifiers-order":["P1659","P1660"],"id":"Q2811215$E31501E9-CBF7-4074-8C1D-11948474E1F1","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Leakage squeezing using cellular automata and its application to scan attack","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Leakage_squeezing_using_cellular_automata_and_its_application_to_scan_attack"}}}}}