Computer Science
side-channel
100%
Power Analysis
83%
Block Cipher
65%
Experimental Result
37%
Genetic Algorithm
29%
Cryptographic Algorithm
24%
Candidate Key
23%
Data Complexity
19%
Internet of Things
18%
Ciphertext
16%
Time Complexity
16%
Public-Key Cryptosystems
14%
Artificial Intelligence
13%
Deep Learning
13%
Clustering Method
12%
Elliptic curve scalar multiplication
12%
Clustering Algorithm
12%
Points of Interest
11%
Cryptography
11%
Effective Method
9%
Security Analysis
9%
Input/Output
9%
Autoencoder
9%
Hashing
9%
Edge Computing
9%
Encryption Scheme
9%
Reverse Engineering
9%
Residual Neural Network
9%
Hash Function
9%
Random Function
9%
Convolutional Neural Network
9%
Privacy Threat
9%
Communication Process
9%
Exhaustive Search
9%
Plaintext Attack
9%
Unknown Command
9%
Detection Method
9%
Public Key Algorithm
9%
Timing Analysis
9%
Reinforcement Learning
9%
Hardware Implementation
9%
Software Implementation
8%
Data Security
8%
Smart Card
8%
Execution Time
7%
Cryptographic Device
6%
Neural Network
6%
Noise-to-Signal Ratio
6%
Parallel Hardware
6%
Engineering
Genetic Algorithm
29%
Success Rate
29%
Side Channel
22%
Block Cipher
21%
Artificial Intelligence
16%
Linear Function
9%
Exhaustive Search
9%
Structure Function
9%
Output Value
9%
Constant Value
9%
Space Data
9%
Code Book
9%
Differential Output
9%
Differential Input
9%
Anomaly Detection
9%
Gaussian White Noise
9%
Nodes
9%
Adjustment Parameter
9%
Based Detection Method
9%
Linear Time
9%
Electric Power Utilization
8%
Side Channel Attack
5%
Experimental Result
5%