Computer Science
Automated Tool
6%
Block Cipher
31%
Brute Force Attack
20%
Compression Function
68%
Cryptanalysis
41%
Cryptographic Hash
6%
Cryptographic Primitive
20%
Differential Cryptanalysis
27%
Encryption
6%
Energy Consumption
5%
forgery attack
20%
Function Evaluation
17%
Hardware Implementation
10%
Hash Function
100%
Hashing
20%
Heuristic Search
10%
Linear Cryptanalysis
20%
Linear Function
6%
Master Secret Key
6%
Mathematical Structure
6%
Memory Requirement
5%
Message Authentication Code
10%
Probability Estimation
10%
Random Graphs
6%
Security Analysis
10%
Serial Implementation
10%
Software Implementation
20%
Special Attention
10%
Successful Attack
6%
Symmetric Key Cryptography
20%
Table Lookup
5%
Mathematics
Advanced Encryption Standard
41%
Block Cipher
31%
Ciphertext
10%
Cryptanalysis
10%
Cube
10%
Differential Cryptanalysis
10%
Hash Function
20%
Linear Cryptanalysis
20%
Linear Function
6%
Linear Transformation
5%
Mathematical Structure
6%
Modes of Operation
6%
Multiplicative Inverse
5%
Pre-Image
6%
S-Box
5%
Secure Hash Algorithm 1
10%