Ingenjörs- och materialvetenskap
Authentication
100%
Polynomials
50%
Cryptography
45%
Shift registers
34%
Built-in self test
34%
Data compression
29%
Hardware security
26%
Industry
21%
Image compression
20%
Trusted computing
18%
Telecommunication industry
18%
Recovery
18%
Substitution reactions
18%
Convolutional codes
16%
Feedback
16%
HTTP
16%
Computer operating systems
15%
Secure communication
15%
Combinatorial optimization
15%
Augmented reality
14%
Linux
14%
System-on-chip
13%
Virtual machine
13%
Application programming interfaces (API)
12%
Cloud computing
12%
Redundancy
11%
SGML
11%
Glass
10%
Networks (circuits)
10%
Availability
9%
Uncertainty
8%
Data handling
8%
Computational complexity
7%
XML
6%
National security
5%
Matematik
Authentication
37%
Attack
27%
Data Integrity
26%
Authentication Codes
24%
Hardware
22%
Deception
21%
Countermeasures
21%
Built-in Self-test
19%
Digital Signature
19%
Aliasing
18%
Signature Scheme
17%
Hash Function
16%
Random Error
16%
Linear Complexity
16%
Concatenation
16%
Error-correcting Codes
16%
Decoding
15%
Linear Codes
14%
Electronics
14%
Profile
11%
Grouping
10%
Generator
10%
Subspace
9%
Digit
9%
Randomness
9%
Lower bound
9%
Observation
8%
Unknown
8%
Context
8%
Logic
8%
Message Authentication Code
7%
Coding Theory
7%
Polynomial
7%
Generalization
6%
Information Rates
6%
Family
6%
Integrity
6%
Markov Chain Model
5%
High Speed
5%
Minimal polynomial
5%
Entropy
5%
Irreducible polynomial
5%
Reputation
5%
Binary Sequences
5%
Hermitian Curve
5%