Keyphrases
Cryptanalysis
83%
Block Cipher
72%
Cube Attack
59%
Cipher
59%
Hash Function
56%
Time Complexity
51%
Key Recovery Attack
41%
Cube Tester
37%
Keccak
35%
Time-memory Trade-off
30%
Exhaustive Search
28%
Grain-128
28%
Tight
28%
Memory Complexity
27%
Generic Attack
26%
Stream Cipher
25%
Encryption
25%
Known Attacks
24%
Random Permutation
23%
GF-2
22%
Differential Cryptanalysis
21%
Trivium
19%
Algebraic Attack
19%
Encryption Scheme
18%
Tight Upper Bound
17%
Bicomposite
17%
Cryptosystem
17%
Nonlinear Layer
17%
High Probability
16%
Haifa
15%
LowMC
15%
Discrete Logarithm Problem
14%
Homomorphic Secret Sharing
14%
Key Recovery
14%
Hash-based
14%
Checkpointing Algorithms
14%
Discrete Log
14%
Sponge Function
14%
Tight Bounds
14%
Tight Lower Bound
14%
K-sum
14%
Dissection Technique
14%
Search Problems
14%
Space Lower Bound
14%
FX Construction
14%
Affine Equivalence
14%
Main Components
14%
Combinatorial Search Problems
14%
Indistinguishability
14%
Hash Combiner
14%
Computer Science
Block Cipher
100%
Cryptanalysis
98%
Hash Function
93%
Time Complexity
78%
Exhaustive Search
47%
Stream Cipher
41%
Encryption Scheme
34%
Cryptography
26%
Cryptographic Primitive
23%
Compression Function
23%
Secret Sharing
22%
Knapsack Problem
21%
Tree Algorithm
21%
Differential Cryptanalysis
21%
Signature Scheme
18%
Attackers
16%
Discrete Logarithm
14%
Algebraic Normal Form
14%
False Negative
14%
Typical Example
14%
Reconfigurable Hardware
14%
Obfuscation
14%
Cryptographic Attack
14%
Random Function
14%
Equation System
14%
Main Component
14%
Modified Version
14%
Message Length
12%
forgery attack
12%
Degree Polynomial
12%
security level
12%
Internal State
12%
Space Complexity
11%
Hamming Distance
10%
Side Channel
10%
Data Complexity
9%
Side Channel Attack
9%
Design Strategy
8%
Polynomial Equation
7%
Ciphertext
7%
Hashing
7%
Cryptology
7%
secret sharing scheme
7%
Data Memory
7%
Secure Communication
7%
Device Encryption
7%
Internet of Things
7%
Linear Cryptanalysis
7%
Proof System
7%
Differential Privacy
7%
Mathematics
Cryptanalysis
83%
Block Cipher
69%
Probability Theory
48%
Key Bit
40%
Cube
34%
Cube Attack
34%
Stream Cipher
26%
Random Permutation
22%
Nonlinear
22%
Differential Cryptanalysis
21%
XOR
21%
Hash Function
20%
Meet-in-the-Middle Attack
19%
Permutation
19%
Worst Case
16%
Discrete Logarithm
14%
Lower and upper bounds
14%
Affine Transformation
14%
Conditionals
14%
Equation System
14%
Upper Bound
14%
Random Function
14%
Indistinguishability
14%
Asymptotics
13%
Branching Programs
11%
Polynomial
10%
Integer
9%
Linear Algebra
9%
Fourier Analysis
8%
Round Key
8%
Optimality
8%
Low Degree
7%
Fixed Point Property
7%
Differential Probability
7%
Quadratic Mapping
7%
Linear Function
7%
One-Way Function
7%
Statistical Property
7%
Linear Cryptanalysis
7%
Subkey
7%
Polynomials Method
7%
Final State
7%
Initial State
7%
Model of Computation
7%
Ciphertext
7%
Dynamic Cube Attack
7%
Performance Measure
7%
Strong Evidence
7%
Soviet Union
7%
Restricted Model
7%