Mathematics
Attack
25%
Encapsulation
23%
Software
19%
Speedup
16%
Permutation
15%
Modes of Operation
15%
Multiplication
15%
Decoding
15%
Coagulation
15%
Standardization
14%
Architecture
14%
Failure Rate
13%
Fragmentation
13%
Modular Exponentiation
12%
Encryption
12%
Time Constant
11%
Optimization
10%
Performance
10%
Design
10%
Bandwidth
10%
Cryptography
10%
Countermeasures
10%
Block Ciphers
10%
Key Exchange
9%
Polynomial
9%
Fault Attacks
9%
Vulnerability
8%
Quantum Cryptography
8%
Cipher
8%
Server
8%
Advanced Encryption Standard
8%
Model
7%
Inversion
7%
Signature Scheme
7%
Family
7%
Communication
7%
Efficient Implementation
7%
Authenticated Encryption
7%
Collision Attack
7%
Key Management
7%
Security Proof
6%
Montgomery multiplication
6%
Random Permutation
6%
Spatial Interpolation
6%
One-way Hash Function
6%
Key Agreement
6%
Necessary
6%
Fault Detection
6%
Buffer
6%
Cryptosystem
6%
Engineering & Materials Science
Cryptography
100%
Encapsulation
26%
Polynomials
26%
Standardization
23%
Hash functions
22%
Servers
20%
Quantum cryptography
17%
Data storage equipment
16%
Authentication
14%
Side channel attack
12%
Computer hardware
12%
Lakes
12%
Coagulation
10%
Program processors
10%
Random processes
10%
Electronic document identification systems
9%
Network protocols
9%
Decoding
8%
Ice
8%
Bandwidth
8%
Table lookup
8%
Sorting
7%
Trusted computing
7%
Composite materials
7%
Microprocessor chips
7%
Containers
6%
Particle accelerators
6%
Networks (circuits)
6%
Internet
6%
Communication
6%
Virtual machine
6%
Reed-Solomon codes
5%
Quantum computers
5%