Mathematics
Advanced Encryption Standard
14%
Architecture
10%
Attack
81%
Cipher
12%
Completeness
7%
Context
12%
Cortex
5%
Countermeasures
5%
Counting
14%
Discriminant Analysis
9%
Enumeration
10%
Evaluation
14%
Graphical Models
9%
Hardware
6%
Higher Order
5%
Independent Component Analysis
11%
kernel
5%
Leakage
72%
Learning
7%
Mask
13%
Masking
20%
Message Authentication Code
14%
Model
9%
Module
5%
Multi-task Learning
9%
Optimality
7%
Permutation
6%
Power Analysis
14%
Prediction
5%
Profiling
20%
Rank Estimation
18%
Ranking
9%
Recovery
9%
Resilience
14%
Reverse Engineering
12%
Schedule
7%
Side Channel Attacks
46%
Side-channel Analysis
14%
Simulator
21%
Software
11%
Strategy
5%
Style
8%
Substitution
7%
Testing
6%
Trace
34%
Training
5%
Univariate
5%
Engineering & Materials Science
Authentication
7%
Autonomous vehicles
8%
Computational complexity
7%
Computer hardware
17%
Cryptography
32%
Defects
7%
Discriminant analysis
13%
Embedded systems
7%
Encapsulation
9%
Energy utilization
5%
Independent component analysis
9%
Internet of things
15%
Masks
14%
Multi-task learning
18%
Recovery
11%
Reverse engineering
9%
Risk perception
12%
Side channel attack
100%
Simulators
14%
Software engineering
6%
Standardization
10%
Statistical tests
6%
Substitution reactions
8%
Testing
12%
Throughput
5%