Mathematics
Attack
81%
Leakage
72%
Side Channel Attacks
46%
Trace
34%
Simulator
21%
Masking
20%
Profiling
20%
Rank Estimation
18%
Advanced Encryption Standard
14%
Power Analysis
14%
Message Authentication Code
14%
Side-channel Analysis
14%
Counting
14%
Resilience
14%
Evaluation
14%
Mask
13%
Reverse Engineering
12%
Cipher
12%
Context
12%
Software
11%
Independent Component Analysis
11%
Enumeration
10%
Architecture
10%
Discriminant Analysis
9%
Graphical Models
9%
Multi-task Learning
9%
Recovery
9%
Ranking
9%
Model
9%
Style
8%
Schedule
7%
Substitution
7%
Learning
7%
Optimality
7%
Completeness
7%
Permutation
6%
Testing
6%
Hardware
6%
Higher Order
5%
Training
5%
Strategy
5%
kernel
5%
Module
5%
Univariate
5%
Cortex
5%
Countermeasures
5%
Prediction
5%
Engineering & Materials Science
Side channel attack
100%
Cryptography
32%
Multi-task learning
18%
Computer hardware
17%
Internet of things
15%
Masks
14%
Simulators
14%
Discriminant analysis
13%
Testing
12%
Risk perception
12%
Recovery
11%
Standardization
10%
Reverse engineering
9%
Encapsulation
9%
Independent component analysis
9%
Autonomous vehicles
8%
Substitution reactions
8%
Embedded systems
7%
Authentication
7%
Defects
7%
Computational complexity
7%
Software engineering
6%
Statistical tests
6%
Energy utilization
5%
Throughput
5%