Ingenjörs- och materialvetenskap
Decoding
98%
Authentication
88%
Shift registers
85%
Cryptography
80%
Recovery
72%
Polynomials
55%
Convolutional codes
53%
Iterative decoding
48%
Side channel attack
45%
Computational complexity
39%
Feedback
36%
Computer hardware
35%
Hash functions
28%
Block codes
27%
Boolean functions
27%
Data storage equipment
25%
Snow
19%
Standardization
18%
Quantum cryptography
18%
Throughput
15%
Intellectual property core
15%
Table lookup
14%
Random access storage
14%
Clocks
13%
Substitution reactions
11%
Finite automata
11%
Global system for mobile communications
11%
Equivalence classes
11%
Telecommunication industry
10%
Engines
10%
Turbo codes
9%
Concretes
9%
Quantum computers
9%
Information theory
9%
Message passing
8%
Program processors
8%
Random variables
8%
Spectrum analysis
8%
Amplification
8%
Computer science
8%
Transceivers
7%
Radio frequency identification (RFID)
7%
Controllers
7%
Security of data
7%
Statistical methods
7%
4G mobile communication systems
7%
Cloud computing
7%
Costs
6%
Thermodynamics
6%
5G mobile communication systems
6%
Matematik
Attack
100%
Stream Ciphers
97%
Correlation Attack
52%
Distinguishing Attack
45%
Authentication Codes
40%
Linear Feedback Shift Register
31%
Key Recovery
22%
Authentication
20%
Hash Function
19%
Cipher
18%
Family
15%
Coding
13%
Universal Function
13%
Recovery
13%
Cryptanalysis
13%
Side Channel Attacks
13%
Boolean Functions
13%
Deception
12%
Resiliency
12%
Polynomial
12%
Countermeasures
12%
Algebraic Attack
12%
Time Complexity
11%
Covering Codes
11%
Nonlinearity
11%
Resilient Functions
11%
Quasi-cyclic Codes
11%
Galois Rings
10%
Finite State Machine
10%
Leakage
10%
Public-key Cryptosystem
10%
Sample space
9%
Decoding
9%
Linear Relation
9%
Parity
9%
Concatenation
9%
Coding Theory
9%
Exponential Sums
9%
Guess
9%
Output
8%
Spectral Analysis
8%
Metric
8%
Computational Complexity
7%
Resist
7%
Learning
7%
Performance
7%
Encryption
7%
Class
6%
Look-up Table
6%
Galois field
6%