Keyphrases
Provable Security
82%
Block Cipher
79%
Wireless Networks
55%
Linear Cryptanalysis
53%
Differential Cryptanalysis
44%
Secure Communication
43%
Side-channel Attacks
41%
Impossible Differential Cryptanalysis
40%
Finite Fields
37%
Public Key Cryptosystem
37%
Smart Card
36%
Signature Scheme
35%
Password-authenticated Key Exchange
32%
Security Analysis
32%
Quantum Signature Scheme
32%
Differential Power Analysis
30%
Wireless Sensor Networks
28%
GF(2m)
28%
Security Threats
27%
Skipjack
26%
Differential Probability
25%
Substitution-permutation Network
25%
Entanglement Swapping
25%
Diffusion Layer
25%
Cybersecurity
24%
Exponentiation
24%
Recoding
24%
Smart Grid Infrastructure
24%
Operation Mode
24%
Identity-based
24%
Watermarking
24%
Encryption
24%
Cyber-attacks
23%
Sensor Networks
23%
Hardware Architecture
22%
Chosen-plaintext
22%
Quantum Channel
21%
LSB Steganography
21%
Quantum Direct Communication
21%
Internet of Things Services
21%
Secret Key
20%
Normal Basis
20%
Network Data
20%
Intrusion Detection System
20%
Multimedia Services
19%
Linear Hull Effect
19%
Internet of Things Environment
19%
Anonymity
18%
Optimal Basis
18%
Multi-user
18%
Computer Science
Signature Scheme
100%
Block Cipher
68%
Side Channel Attack
68%
Wireless Networks
63%
Power Analysis
56%
Password
51%
Authentication
44%
Secure Communication
41%
Smart Card
40%
Differential Cryptanalysis
36%
Public-Key Cryptosystems
33%
Advanced Encryption Standard
32%
Internet-Of-Things
32%
Hardware Architecture
29%
Key Exchange Protocol
29%
Hash Function
29%
Wireless Sensor Network
28%
provably secure
27%
Anonymity
25%
Cryptanalysis
24%
Security Analysis
24%
Hardware Implementation
24%
Financial Statement
24%
Case Study
24%
Evidence Collection
24%
Smart Grid
24%
Sensor Networks
23%
Communication Protocol
21%
authentication scheme
21%
provable security
20%
Critical Information
20%
Computer Network
20%
Intrusion Detection System
20%
Computer Hardware
20%
Steganography
20%
Multimedia Service
19%
Exhaustive Search
18%
Authenticated Key Exchange
18%
Security Capability
18%
Personal Information
18%
Watermarking
18%
Cyber Physical Systems
18%
Security Requirements
17%
group signature
16%
Radio Frequency Identification
16%
Direct Communication
16%
Information System
16%
Based Delegation
16%
Role-Based Access Control
16%
Key Management Scheme
16%