Engineering & Materials Science
Side channel attack
100%
Cryptography
67%
Data storage equipment
50%
Program processors
40%
Computer hardware
40%
Data privacy
21%
Recovery
21%
Authentication
20%
Reduced instruction set computing
18%
Specifications
18%
Flow control
18%
Hash functions
17%
Mobile computing
16%
Data Sharing
15%
Application programs
13%
e-government
13%
Temporal logic
13%
Linux
12%
Blockchain
12%
Internet of things
11%
Standardization
11%
Quantum cryptography
11%
Malware
11%
Access control
9%
Security of data
9%
Smartphones
9%
Application programming interfaces (API)
9%
Encapsulation
8%
Markov processes
8%
Microcontrollers
8%
Cryptocurrency
8%
Field programmable gate arrays (FPGA)
7%
Websites
7%
Virtual machine
7%
Computer operating systems
7%
Cloud computing
7%
Testing
7%
Bitcoin
6%
Public administration
6%
Networks (circuits)
6%
Reinforcement learning
6%
Shielding
6%
Application specific integrated circuits
6%
Costs
6%
Communication
6%
Polynomials
6%
Particle accelerators
6%
Industry
5%
Servers
5%
Trusted computing
5%
Internet
5%
Sampling
5%
Network protocols
5%
Learning algorithms
5%
Cyber Physical System
5%
Interoperability
5%
Physical addresses
5%
Clocks
5%
Mathematical transformations
5%
Machine learning
5%
Mathematics
Attack
33%
Block Ciphers
14%
Key Recovery
13%
Fault Attacks
9%
Authenticated Encryption
9%
Safety
8%
Collision Attack
8%
Cipher
8%
Specification
8%
Synthesis
8%
Design
8%
Service Composition
8%
Encryption
7%
Fault
7%
Privacy Preserving
7%
S-box
7%
Leakage
6%
Performance
6%
Side Channel Attacks
6%
Signature Scheme
6%
Cache
6%
Actors
6%
Hash Function
6%
Permutation
5%
Access Control
5%
Reactive Systems
5%
Hashing
5%
Business & Economics
Privacy
15%
Attack
14%
Encryption
13%
Privacy Preserving
12%
Identity Management
9%
Authentication
5%