Computer Science
Attack
100%
Block Cipher
53%
Cryptanalysis
23%
Lightweight Cryptography
22%
Encryption
21%
Probability
17%
Hashing
17%
forgery attack
14%
Proof System
13%
Algorithms
11%
Protection
11%
Computing
11%
Implementation Perspective
11%
Markov Decision Process
11%
Application Function
11%
Encryption Scheme
11%
Hash Function
11%
Ciphertext
6%
Use Case
6%
Success Probability
5%
design rationale
5%
side-channel
5%
Constrained Environment
5%
Security Evaluation
5%
Cryptographic Technique
5%
Active Learning Technique
5%
Structure Model
5%
Collect Information
5%
Perfect Information
5%
Regular Language
5%
Design for Assembly
5%
Hit Rate
5%
Victim Cache Line
5%
Aes
5%
Cache Hit Rate
5%
Constrained Device
5%
Heuristics
5%
Search Strategies
5%
Constraint Programming
5%
Theoretical Framework
5%
Evaluation
5%
Error Detection Mechanism
5%
Average Latency
5%
Exception Handler
5%
User
5%
Modified Version
5%
Standards
5%
Service
5%
Mathematics
Block Cipher
84%
Bounds
43%
Zero Correlation
23%
Probability Theory
17%
Subkey
17%
Number
15%
Correlation Attack
14%
Apply It
14%
Differential Probability
13%
Permutation
13%
Points
11%
Linear Hull
11%
Ciphertext
11%
Wide Range
11%
Variables
11%
Random Permutation
11%
Modeling
8%
S-Box
8%
Latency
7%
Partial Sum
7%
Round Key
5%
Differential Cryptanalysis
5%
Assuming Independence
5%
Classical Integral
5%
Finite Fourier Transform
5%