Computer Science
Attack
100%
Cryptanalysis
87%
Block Cipher
76%
Design
47%
Computation
43%
Probability
40%
Fully Homomorphic Encryption
37%
Application
30%
Complexity
26%
Functions
26%
Encryption
24%
Transitions
23%
Differential Cryptanalysis
23%
Data Complexity
20%
Knowledge Proof
20%
Hashing
20%
Formal Analysis
20%
Links
20%
Data Instance
20%
Vectors
16%
Classes
16%
Main Component
13%
Symmetric Cryptography
13%
Linear Cryptanalysis
13%
Design Strategy
13%
Instantiation
13%
Ciphertext
11%
Cryptographic Technique
10%
Default Parameter
10%
Data Encryption
10%
Computer
10%
Networks
10%
Plaintext
7%
Cryptographic Primitive
6%
Operation Support
6%
Practical Application
6%
Security Analysis
6%
Performance Improvement
6%
Hash Function
6%
Optimization
6%
Cryptographic Hash
6%
Use Case
6%
Communication Complexity
6%
Computation Complexity
6%
Signature Scheme
6%
Communication
6%
Standards
6%
Symmetric Cipher
6%
Macroscopic Connectivity
6%
Continuous Transition
6%
Mathematics
Block Cipher
46%
Cryptanalysis
42%
Probability Theory
40%
Characteristics
20%
Order
20%
Discontinuities
20%
Formal Analysis
20%
Differential Cryptanalysis
16%
Nonlinear
13%
Connectivity
13%
Vertex
13%
Fixed Number
13%
Zeros
13%
AES
10%
Round Function
10%
Exact Differential
10%
Large Set
10%
Constant
10%
Classes
10%
Functions
10%
Linear Cryptanalysis
10%
Parameters
10%
Multiplicative
6%
XOR
6%
Minimizes
6%
Continuous Transition
6%
Modeling
6%
Complex Networks
6%
Macroscopic
6%
Transition Point
6%
Concludes
6%
Number
6%