Computer Science
Hash Function
100%
Compression Function
52%
Cryptanalysis
39%
Differential Cryptanalysis
16%
forgery attack
15%
Automated Tool
12%
Coding Theory
12%
Linear Cryptanalysis
12%
Cryptographic Hash
10%
Security Analysis
10%
Block Cipher
10%
Function Evaluation
10%
Advanced Encryption Standard
9%
Ciphertext
9%
Stream Cipher
9%
Encryption Scheme
9%
Attack Strategy
9%
Memory Requirement
8%
Automatic Search
7%
Searching Algorithm
6%
Cycle Finding
6%
SIMD
6%
Brute Force Attack
6%
Complex Structure
6%
Hashing
6%
Symmetric Key Cryptography
6%
Vector Implementation
6%
Key Length
6%
Exhaustive Search
6%
Software Implementation
6%
Boolean Function
6%
Channel Analysis
6%
Search Strategy
6%
Key Schedule
5%
Mathematics
Hash Function
45%
Cryptanalysis
38%
Advanced Encryption Standard
28%
Differential Cryptanalysis
15%
Block Cipher
15%
Permutation
12%
Linear Cryptanalysis
12%
Secure Hash Algorithm 1
9%
Function Evaluation
8%
Pre-Image
8%
Degree of Freedom
7%
Nonlinearity
6%
Step Function
6%
Boolean Function
6%
Covering Codes
6%
Complex Structure
6%
Random Behavior
6%
Cipher Key
6%
Key Property
6%
Functional Property
6%
Stream Cipher
6%
Distinguishing Attack
6%
Nonlinear
5%