Engineering & Materials Science
Side channel attack
100%
Cryptography
68%
Data storage equipment
50%
Computer hardware
40%
Program processors
38%
Recovery
22%
Data privacy
21%
Flow control
19%
Specifications
18%
Hash functions
18%
Reduced instruction set computing
17%
Authentication
15%
e-government
15%
Application programs
13%
Mobile computing
12%
Data Sharing
12%
Linux
11%
Quantum cryptography
11%
Blockchain
11%
Temporal logic
11%
Internet of things
10%
Markov processes
10%
Encapsulation
10%
Application programming interfaces (API)
10%
Shielding
10%
Standardization
9%
Testing
9%
Networks (circuits)
9%
Reinforcement learning
8%
Malware
8%
Access control
7%
Smartphones
7%
Virtual machine
7%
Particle accelerators
7%
Polynomials
7%
Security of data
7%
Cryptocurrency
7%
Clocks
7%
Machine learning
7%
Computer operating systems
7%
Field programmable gate arrays (FPGA)
6%
Microcontrollers
6%
Application specific integrated circuits
6%
Interoperability
6%
Costs
6%
Learning algorithms
6%
Websites
6%
Industry
5%
Public administration
5%
Cloud computing
5%
Communication
5%
Bitcoin
5%
Servers
5%
Internet
5%
Network protocols
5%
Model checking
5%
Mathematics
Attack
31%
Block Ciphers
15%
Key Recovery
14%
Safety
10%
Fault Attacks
10%
Cipher
9%
Specification
8%
Design
8%
Privacy Preserving
8%
Authenticated Encryption
8%
S-box
7%
Leakage
7%
Synthesis
6%
Collision Attack
6%
Performance
6%
Service Composition
6%
Encryption
6%
Fault
5%
Side Channel Attacks
5%
Hash Function
5%
Cryptography
5%
Signature Scheme
5%
Learning Algorithm
5%
Machine Learning
5%
Resistance
5%
Permutation
5%
Business & Economics
Privacy
13%
Attack
13%
Encryption
12%
Privacy Preserving
12%
Identity Management
9%