Mathematics
Attack
97%
Block Ciphers
61%
Differential Cryptanalysis
47%
Digital Forensics
40%
Hash Function
22%
Encryption
21%
Steganography
20%
Linear Cryptanalysis
20%
Provable Security
19%
Steganalysis
17%
Cipher
16%
Security Analysis
14%
Multimedia
14%
Modes of Operation
14%
Watermark
14%
Watermarking
13%
Related-key Attack
12%
Permutation
11%
Key Recovery
11%
Compression Function
11%
Evidence
10%
Methodology
9%
Server
9%
Design
9%
Authentication
9%
Exhaustive Search
9%
Differential Power Analysis
8%
Regular hexahedron
8%
Internet of Things
8%
Black Box
8%
One-way Hash Function
7%
Correlation Attack
7%
S-box
7%
Access Control
7%
Rectangle
7%
Electronic Mail
6%
Substitution
6%
Collision
6%
Linear Approximation
6%
Model
6%
Smart Home
6%
Experiment
6%
Dependent Data
6%
Ubiquitous Computing
5%
Software
5%
Transactions
5%
Boolean Functions
5%
Recovery
5%
Pixel
5%
Business
5%
Engineering & Materials Science
Digital forensics
100%
Cryptography
38%
Hash functions
28%
Recovery
22%
Servers
21%
Authentication
20%
Multimedia services
19%
Industry
18%
Crime
17%
Steganography
17%
Smartphones
16%
Web browsers
15%
Side channel attack
13%
Metadata
12%
Digital devices
12%
Data storage equipment
11%
Substitution reactions
11%
Watermarking
10%
Computer hardware
8%
Internet of things
8%
Internet
8%
Malware
7%
Access control
7%
Ecosystems
7%
Experiments
7%
Boolean functions
7%
Hard disk storage
7%
Ubiquitous computing
7%
Windows operating system
6%
Flash memory
6%
Electronic mail
6%
Computer systems
6%
Embedded systems
6%
Application programs
5%
Cloud computing
5%
Mobile computing
5%
Security of data
5%
Interoperability
5%
Adders
5%
Statistics
5%