Mathematics
Attack
86%
Block Ciphers
54%
Differential Cryptanalysis
41%
Digital Forensics
35%
Hash Function
19%
Encryption
18%
Steganography
18%
Linear Cryptanalysis
17%
Provable Security
17%
Steganalysis
15%
Cipher
14%
Security Analysis
13%
Multimedia
13%
Modes of Operation
12%
Watermark
12%
Watermarking
11%
Related-key Attack
11%
Permutation
10%
Key Recovery
10%
Compression Function
10%
Evidence
9%
Methodology
8%
Server
8%
Design
8%
Authentication
8%
Exhaustive Search
8%
Differential Power Analysis
7%
Regular hexahedron
7%
Internet of Things
7%
Black Box
7%
One-way Hash Function
7%
Correlation Attack
6%
S-box
6%
Access Control
6%
Rectangle
6%
Electronic Mail
6%
Substitution
6%
Collision
5%
Linear Approximation
5%
Model
5%
Smart Home
5%
Experiment
5%
Dependent Data
5%
Ubiquitous Computing
5%
Software
5%
Transactions
5%
Engineering & Materials Science
Digital forensics
100%
Cryptography
34%
Hash functions
24%
Recovery
22%
Servers
20%
Authentication
19%
Multimedia services
17%
Industry
16%
Crime
15%
Steganography
15%
Smartphones
15%
Web browsers
15%
Metadata
14%
Side channel attack
11%
Digital devices
11%
Data storage equipment
10%
Substitution reactions
9%
Internet of things
9%
Watermarking
8%
Internet
7%
Computer hardware
7%
Ecosystems
7%
Malware
6%
Access control
6%
Experiments
6%
Mobile computing
6%
Boolean functions
6%
Hard disk storage
6%
Data acquisition
6%
Ubiquitous computing
6%
Windows operating system
6%
Flash memory
5%
Application programs
5%
Electronic mail
5%
Computer systems
5%
Embedded systems
5%
Cloud computing
5%