{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T11:08:04Z","timestamp":1777547284362,"version":"3.51.4"},"reference-count":14,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T00:00:00Z","timestamp":1486598400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>In the past when only \u201cpaper and pencil\u201d ciphers were in use, a mnemonic\nBellaso\u2019s method was applied to obtain a permutation from a meaningful\nphrase. It turns out that even nowadays this method and its variations are\nemployed and provide a simple but at the same time efficient tool for some\nciphers. To the best of our knowledge the security of such ciphers has not been\nevaluated yet in all respects. Therefore, in this paper we initiate a study of\ntheir security with respect to the probability distribution of permutations\nobtained by Bellaso\u2019s method.<\/jats:p>","DOI":"10.1515\/jmc-2016-0058","type":"journal-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T05:05:57Z","timestamp":1486616757000},"page":"45-53","source":"Crossref","is-referenced-by-count":2,"title":["On a mnemonic construction of permutations"],"prefix":"10.1515","volume":"11","author":[{"given":"Eugen","family":"Antal","sequence":"first","affiliation":[{"name":"Slovak University of Technology, Bratislava, Slovakia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Otokar","family":"Gro\u0161ek","sequence":"additional","affiliation":[{"name":"Slovak University of Technology, Bratislava, Slovakia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Horak","sequence":"additional","affiliation":[{"name":"University of Washington, Tacoma, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"374","published-online":{"date-parts":[[2017,2,9]]},"reference":[{"key":"2025120600295335969_j_jmc-2016-0058_ref_001_w2aab3b7e1120b1b6b1ab2b1b1Aa","doi-asserted-by":"crossref","unstructured":"Bard G. V., Ault S. V. and Courtois N. T.,\nStatistics of random permutations and the cryptanalysis of periodic block ciphers,\nCryptologia 36 (2012), 240\u2013262.","DOI":"10.1080\/01611194.2011.632806"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_002_w2aab3b7e1120b1b6b1ab2b1b2Aa","unstructured":"Bauer F. L.,\nDecrypted Secrets. Methods and Maxims of Cryptology,\nSpringer, Berlin, 2007."},{"key":"2025120600295335969_j_jmc-2016-0058_ref_003_w2aab3b7e1120b1b6b1ab2b1b3Aa","unstructured":"Bellaso G. B.,\nNovi et singolari modi di cifrare de l\u2019eccellente dottore di legge Messer Giouan Battista Bellaso nobile bresciano,\nLodovico Britannico, Brescia, 1555."},{"key":"2025120600295335969_j_jmc-2016-0058_ref_004_w2aab3b7e1120b1b6b1ab2b1b4Aa","doi-asserted-by":"crossref","unstructured":"Carlitz L., Kurtz D. C., Scoville R. and Stackelberg O. P.,\nAsymptotic properties of Eulerian numbers,\nZ. Wahrscheinlichkeitstheor. Verw. Geb. 23 (1972), 47\u201354.","DOI":"10.1007\/BF00536689"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_005_w2aab3b7e1120b1b6b1ab2b1b5Aa","unstructured":"Eulerus L.,\nInstitutiones calculi differentialis cum eius usu in analysi finitorum ac doctrina serierum,\nAcademia Scientiarum Imperialis Petropolitanae, Sankt Petersburg, 1755."},{"key":"2025120600295335969_j_jmc-2016-0058_ref_006_w2aab3b7e1120b1b6b1ab2b1b6Aa","doi-asserted-by":"crossref","unstructured":"Goldreich O.,\nFoundations of Cryptography: Basic Tools,\nCambridge University Press, Cambridge, 2001.","DOI":"10.1017\/CBO9780511546891"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_007_w2aab3b7e1120b1b6b1ab2b1b7Aa","unstructured":"Hagen J. G.,\nTheorie der Combinationen,\nSynopsis der h\u00f6heren Mathematik. Erster Band. Arithmetische und algebrische Analysis,\nFelix L. Dames, Berlin (1891), 55\u201368."},{"key":"2025120600295335969_j_jmc-2016-0058_ref_008_w2aab3b7e1120b1b6b1ab2b1b8Aa","doi-asserted-by":"crossref","unstructured":"Knuth D. E.,\nThe Art of Computer Programming. Vol. 2.,\nAddison-Wesley, Boston, 2006.","DOI":"10.1145\/1283920.1283929"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_009_w2aab3b7e1120b1b6b1ab2b1b9Aa","doi-asserted-by":"crossref","unstructured":"Kollar J.,\nSoviet vic cipher: No respector of Kerckhoff\u2019s principles,\nCryptologia 40 (2016), no. 1, 33\u201348.","DOI":"10.1080\/01611194.2015.1028679"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_010_w2aab3b7e1120b1b6b1ab2b1c10Aa","doi-asserted-by":"crossref","unstructured":"Liskov M., Rivest R. L. and Wagner D.,\nTweakable block ciphers,\nJ. Cryptology 24 (2011), 588\u2013613.","DOI":"10.1007\/s00145-010-9073-y"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_011_w2aab3b7e1120b1b6b1ab2b1c11Aa","doi-asserted-by":"crossref","unstructured":"Petersen T. K.,\nEulerian Numbers,\nBirkh\u00e4user, Basel, 2015.","DOI":"10.1007\/978-1-4939-3091-3"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_012_w2aab3b7e1120b1b6b1ab2b1c12Aa","unstructured":"Rivest R. L.,\nSymmetric encryption via keyrings and ECC,\npreprint 2016, http:\/\/arcticcrypt.b.uib.no\/files\/2016\/07\/Slides-Rivest.pdf."},{"key":"2025120600295335969_j_jmc-2016-0058_ref_013_w2aab3b7e1120b1b6b1ab2b1c13Aa","doi-asserted-by":"crossref","unstructured":"Worpitzky J.,\nStudien \u00fcber die Bernoullischen und Eulerschen Zahlen,\nJ. Reine Angew. Math. 94 (1883), 203\u2013232.","DOI":"10.1515\/crll.1883.94.203"},{"key":"2025120600295335969_j_jmc-2016-0058_ref_014_w2aab3b7e1120b1b6b1ab2b1c14Aa","unstructured":"Zajac P.,\nPassphrase generator and typing,\n2016, http:\/\/hanzo.sk\/TP\/."}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/jmc\/11\/1\/article-p45.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2016-0058\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2016-0058\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T00:30:18Z","timestamp":1764981018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jmc-2016-0058\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,9]]},"references-count":14,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2017,3,1]]},"published-print":{"date-parts":[[2017,3,1]]}},"alternative-id":["10.1515\/jmc-2016-0058"],"URL":"https:\/\/doi.org\/10.1515\/jmc-2016-0058","relation":{},"ISSN":["1862-2984","1862-2976"],"issn-type":[{"value":"1862-2984","type":"electronic"},{"value":"1862-2976","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2,9]]}}}