Computer Science
Application Benchmark
15%
Application Specific Integrated Circuit
65%
Average Power Consumption
15%
Backdoors
30%
Case Study
15%
chosen ciphertext attack
30%
Clock Cycle
15%
Clock Frequency
57%
Computation Time
30%
Computational Bottleneck
15%
Computer Hardware
20%
Decryption
19%
Digital Signature Scheme
15%
Efficient Implementation
15%
Encryption Scheme
44%
Field Programmable Gate Array
68%
Free Memory
15%
Fully Homomorphic Encryption
69%
Hardware Accelerator
45%
Hardware Platform
30%
Hardware Trojan Horse
22%
High Throughput
15%
Homomorphic Encryption
97%
homomorphic-encryption
30%
Integer Factorization
15%
Internet-Of-Things
15%
Isogeny-based Cryptography
30%
Key Generation
67%
Lattice-Based Cryptography
30%
Learning with Errors
44%
Memory Consumption
30%
Memory Footprint
15%
Memory Management
15%
Microcontroller
15%
Multipath Delay
30%
Number System
30%
Optimization Strategy
45%
Order Processing
15%
Parallelism
15%
Performance Improvement
15%
Performance Optimization
30%
Quantum Computer
15%
Quantum Cryptography
100%
security level
24%
side-channel
30%
Signature Generation
24%
Signature Verification
24%
Social Medium Website
15%
Software Implementation
45%
Speed-up
30%
Engineering
Bit Word
9%
Ciphertext
30%
Classical Technique
15%
Clock Frequency
7%
Decapsulation
30%
Field Programmable Gate Array
7%
Instantiation
15%
Memory Block
9%
Number System
30%
Parallelism
7%
Quantum Cryptography
50%
Secret Key
24%
Side Channel
30%
Side Channel Attack
9%
Target Device
9%