Computer Science
Attack
100%
Computation
76%
Countermeasures
74%
Protection
50%
Power Analysis
50%
side-channel
48%
Software
46%
Security Implication
40%
Computational Complexity
40%
Information Leakage
40%
Formal Verification
40%
Mutual Information
40%
Hardware
26%
Instruction Sequence
20%
Software Implementation
20%
Memory Access
16%
Shared Memories
16%
Attackers
16%
Attack Resistance
16%
Application Problem
13%
Running Program
13%
Evaluation Board
10%
Embedded Systems
10%
User Experience
10%
Workflow
10%
runtime verification
10%
secret sharing scheme
10%
Software Verification
10%
Hypervisor
8%
Side Channel
8%
Microarchitecture
8%
Attack Technique
8%
covert channel
8%
Entropy
8%
linux system
8%
Energy Consumption
8%
Attack Scenario
8%
Power Consumption
8%
secret data
8%
Physical Address
8%
Booleans
8%
Cryptographic Device
8%
Smart Card
8%
Threat
8%
Factorization
8%
Detection Mechanism
8%
Information Leak
8%