Computer Science
Power Analysis
100%
embedded memory
57%
Disk Encryption
57%
External Authentication
57%
Memory Latency
57%
Authentication
57%
side-channel
57%
Secure Communication
57%
Physical Access
38%
Encryption Scheme
33%
authentication scheme
19%
Attackers
19%
Memory Content
19%
Authentication Technique
19%
covert channel
17%
Side Channel
14%
Physical Attacker
14%
Sensitive Informations
14%
Block Cipher
14%
Filesystems
14%
Multiprocessor System
11%
Bandwidth Utilization
11%
Application Specific Integrated Circuit
11%
Data Encryption
9%
Cryptographic Primitive
9%
encryption key
9%
Cache Organization
7%
Hypervisor
5%
Memory Access
5%
Restrictive Environment
5%