Jump to content

Wikipedia:Articles for deletion/DECIM

From Wikipedia, the free encyclopedia
The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was keep. – Joe (talk) 09:18, 4 June 2021 (UTC)[reply]

DECIM (edit | talk | history | protect | delete | links | watch | logs | views) – (View log)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

Article has been around for over 10 years and there's still no sources other than some published papers, no secondary sources, nothing showing notability. Likeanechointheforest (talk) 21:22, 12 May 2021 (UTC)[reply]

Note: This discussion has been included in the list of Computing-related deletion discussions. CAPTAIN RAJU(T) 22:05, 12 May 2021 (UTC)[reply]
Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Sandstein 07:22, 20 May 2021 (UTC)[reply]
  • doi:10.1007/11799313_3 (already cited in the article and the same as the PDF raw hyperlinked above) is reliable and independent, but by itself is thin. Bernstein at https://cr.yp.to/streamciphers.html addresses eSTREAM in toto, rather than DECIM in depth, which is listed as one of many at https://cr.yp.to/streamciphers/attacks.html#decim-v1 . I always want multiple independent sources, and the aforemented claimed renown can be demonstrated by more than that just 1 paper, after 15 years of people purportedly pointing to this as a renowned example.

    However, I do not think that this is in fact the case. I cannot find people pointing to this as a renowned example.

    Instead, the introduction of doi:10.1016/j.mcm.2011.01.057 (also already cited in the article) indicates that there is a significant body of independent literature addressing the revised versions of this subject (v2 and -128). Other things such as https://www.ijcsit.com/docs/Volume%202/vol2issue6/ijcsit2011020662.pdf (which isn't much but is something) and https://eprint.iacr.org/2008/128 also turn up on a search. This subject is not renowned, it is documented on its merits, and the aforementioned doi:10.1016/j.mcm.2011.01.057 does so in depth, both the original algorithm(s) and a summary of the subsequent literature to 2012. This is a poor article, that is uninformative and superficial. But then that is true of so much of Wikipedia, and Project:deletion policy is that we keep in the hopes that one day someone will take doi:10.1016/j.mcm.2011.01.057 and the like in hand and actually improve this stub.

    Uncle G (talk) 11:20, 20 May 2021 (UTC)[reply]

  • Keep. As demonstrated by above sources, this algorithm has significant third-party coverage. Most modern cryptography is built on idea of learning about past mistakes (to avoid them in new designs). This article deffinitelly needs improvement, but not WP:TNT.Anton.bersh (talk) 13:05, 20 May 2021 (UTC)[reply]
Relisted to generate a more thorough discussion and clearer consensus.
Please add new comments below this notice. Thanks, Missvain (talk) 23:33, 27 May 2021 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.