Mathematics
Attack
91%
Block Ciphers
57%
Differential Cryptanalysis
44%
Digital Forensics
37%
Hash Function
21%
Encryption
20%
Steganography
19%
Linear Cryptanalysis
18%
Provable Security
18%
Steganalysis
16%
Cipher
15%
Security Analysis
13%
Multimedia
13%
Modes of Operation
13%
Watermark
13%
Watermarking
12%
Related-key Attack
12%
Permutation
11%
Key Recovery
10%
Compression Function
10%
Evidence
9%
Methodology
9%
Server
9%
Design
8%
Authentication
8%
Exhaustive Search
8%
Differential Power Analysis
8%
Regular hexahedron
8%
Internet of Things
8%
Black Box
7%
One-way Hash Function
7%
Correlation Attack
7%
S-box
7%
Access Control
7%
Rectangle
7%
Electronic Mail
6%
Substitution
6%
Collision
6%
Linear Approximation
6%
Model
6%
Smart Home
5%
Experiment
5%
Dependent Data
5%
Ubiquitous Computing
5%
Software
5%
Transactions
5%
Boolean Functions
5%
Recovery
5%
Pixel
5%
Engineering & Materials Science
Digital forensics
100%
Cryptography
36%
Hash functions
26%
Recovery
23%
Servers
20%
Authentication
19%
Multimedia services
18%
Industry
17%
Crime
16%
Steganography
16%
Smartphones
16%
Metadata
14%
Web browsers
14%
Side channel attack
12%
Digital devices
11%
Data storage equipment
10%
Substitution reactions
10%
Watermarking
9%
Internet of things
8%
Computer hardware
7%
Internet
7%
Malware
7%
Access control
7%
Ecosystems
7%
Experiments
7%
Mobile computing
7%
Boolean functions
6%
Hard disk storage
6%
Ubiquitous computing
6%
Windows operating system
6%
Flash memory
6%
Electronic mail
5%
Computer systems
5%
Embedded systems
5%
Application programs
5%
Cloud computing
5%
Security of data
5%