Engineering & Materials Science
Cryptography
100%
Side channel attack
78%
Microcontrollers
72%
Firmware
58%
Computer hardware
46%
Transponders
42%
Application programs
39%
Internet of things
39%
Reverse engineering
37%
Interfaces (computer)
35%
Reduced instruction set computing
35%
Voltage scaling
35%
Embedded systems
32%
Data storage equipment
30%
Program processors
29%
Quantum cryptography
27%
Electric potential
27%
Ubiquitous computing
25%
Network protocols
25%
Recovery
25%
Electric power utilization
22%
Glucose
21%
Access control
20%
Energy utilization
20%
Authentication
19%
Biometrics
18%
Computer debugging
17%
Field programmable gate arrays (FPGA)
15%
Biomedical equipment
13%
Costs
13%
Internet
12%
Control systems
11%
Blood
11%
Linux
11%
Communication
11%
Monitoring
10%
Dynamic analysis
10%
Clocks
10%
Discriminant analysis
10%
Supervised learning
10%
Sodium chloride
10%
Standardization
9%
Cloning
7%
Learning algorithms
7%
Remote control
7%
Static analysis
7%
Automation
7%
Dynamic frequency scaling
7%
Sensors
7%
Medical problems
6%
Mathematics
Side-channel Analysis
78%
Attack
36%
Reverse Engineering
34%
Internet of Things
34%
Multi-core Processor
33%
Energy Consumption
32%
Cryptography
20%
Resources
17%
Microcontroller
15%
Side Channel Attacks
14%
Communication
11%
Pervasive Computing
9%
Symmetric Cryptography
8%
Access Control
7%
Countermeasures
7%
Embedded Systems
7%
Timing Attack
7%
Radio Frequency Identification
6%
Comprehensive Evaluation
6%
Locking
6%
Object
6%
Key Agreement Protocol
6%
Key Agreement
6%
Susceptibility
6%
Computing
5%
Secure Communication
5%
Hardware
5%
Communication Channels
5%
Design
5%
Wireless Communication
5%
Emergency
5%
Transmitter
5%
Open Source
5%
Authentication
5%
Demonstrate
5%
Vulnerability
5%
Resistance
5%
Confidence
5%
Business & Economics
Enclaves
57%
Attack
43%
Interface Management
29%
Floating
21%
Controller
21%
Vulnerability
17%
Polynomials
14%
Leakage
13%
Microsoft
10%
Fault
9%
Injection
9%
Countermeasures
9%
Hardware
8%
Integrity
8%
Management Power
7%
Authentication
6%
Software
6%
Encryption
6%
Open Source
5%
Mitigation
5%
Cryptography
5%