Computer Science
forgery attack
100%
Cryptanalysis
78%
Differential Cryptanalysis
64%
Ciphertext
64%
Encryption
57%
Encryption Scheme
50%
Linear Cryptanalysis
42%
Security Analysis
21%
Heuristic Search
21%
Autonomous Device
14%
Computational Complexity
14%
Master Secret Key
14%
Clear Understanding
7%
Hard Disk
7%
Overlying Application
7%
Single Solution
7%
Authentication
7%
Information Security
7%
Message Authentication Code
7%
Disk Encryption
7%
secret data
7%
Hash Function
7%
Mathematics
Permutation
78%
Differential Cryptanalysis
64%
Cryptanalysis
64%
Ciphertext
64%
Probability Theory
42%
Linear Cryptanalysis
42%
Cube
21%
S-Box
21%
Secure Hash Algorithm 1
21%
Modes of Operation
14%