Computer Science
Abstraction Layer
13%
Active Learning Technique
6%
Aes
13%
Application Function
13%
Average Latency
13%
Block Cipher
100%
Ciphertext
29%
Collect Information
6%
Computational Complexity
13%
Constrained Environment
13%
Constraint Programming
13%
Cryptanalysis
27%
Cryptographic Hash
13%
Cryptographic Technique
6%
Data Complexity
6%
Design for Assembly
6%
design rationale
13%
Differential Cryptanalysis
27%
Efficient Implementation
13%
Encryption
18%
Encryption Scheme
13%
Error Detection Mechanism
13%
Exception Handler
13%
Faulty Computation
13%
forgery attack
27%
Hash Function
21%
Hashing
20%
Heuristic Search
6%
Implementation Perspective
13%
Lightweight Cryptography
43%
Linear Cryptanalysis
27%
Linear Equation
13%
Markov Decision Process
13%
Normalized Form
13%
Physical Protection
13%
Programming Model
13%
Proof System
13%
Random Permutation
13%
Regular Language
6%
Repeated Application
13%
Security Analysis
11%
side-channel
13%
Software Performance
13%
Structure Model
6%
Substitution-Permutation Network
13%
Success Probability
6%
Theoretical Framework
13%
Time Complexity
13%
Use Case
18%
Version Control
13%
Mathematics
Apply It
13%
Assuming Independence
6%
Block Cipher
76%
Ciphertext
20%
Classical Integral
6%
Cryptanalysis
20%
Cube
6%
Differential Cryptanalysis
6%
Differential Probability
13%
Finite Fourier Transform
6%
Hash Function
8%
Linear Cryptanalysis
13%
Linear Hull
13%
Modes of Operation
9%
Permutation
27%
Probability Theory
20%
Random Permutation
13%
Rotational Symmetry
6%
Round Function
20%
Round Key
20%
Secure Hash Algorithm 1
6%
Stream Cipher
6%
Subkey
27%
Substitution-Permutation Network
13%
Wide Range
13%
Zero Correlation
13%