Keyphrases
Key Extraction
87%
Zero-knowledge
87%
Knowledge Argument
66%
Cryptanalysis
64%
Attacker
61%
Succinct Non-interactive Arguments
60%
Cryptographic
59%
Zero-knowledge Proof
53%
Fully Homomorphic Encryption
51%
Ciphertext
51%
Physical Side-channels
48%
Microphone
48%
Adversary
45%
Number Field Sieve
45%
Side-channel Attacks
45%
Extraction Attacks
39%
Multi-party Computation
39%
Proof System
37%
OpenSSL
37%
Encryption
36%
Cache Attack
36%
Cryptographic Primitives
33%
ElGamal
32%
Privacy-preserving
32%
Secret Key
31%
Snark
30%
Decryption
29%
Verifier
29%
Non-interactive
28%
Sandboxing
27%
Data Dependency
27%
Low Bandwidth
27%
Information Leakage
27%
Caching
26%
Plaintext
26%
Vulnerability
26%
Linux
24%
Table Lookup
24%
Memory Access Pattern
24%
Software Side Channels
24%
Memory Cache
24%
Memory Protection
24%
Secure Network
24%
Memory Virtualization
24%
Attack Strategy
24%
Network Link
24%
Electromagnetic Attacks
24%
Acoustics
24%
Strong Types
24%
Real System
24%
Computer Science
side-channel
100%
Attackers
80%
Cryptanalysis
66%
Proof System
65%
Decryption
64%
Knowledge Proof
61%
Side Channel
54%
Fully Homomorphic Encryption
44%
Ciphertext
44%
Elliptic Curve
42%
Random Access
41%
Computer Hardware
37%
Hash Function
36%
Frequency Signal
36%
Information Retrieval
36%
Distributed Computation
30%
Advanced Encryption Standard
27%
Cryptographic Operation
26%
Cryptographic Primitive
25%
Running Program
25%
Cryptographic Application
24%
Laptop Computer
24%
Information Flow Control
24%
Program Execution
24%
Monitoring Quality
24%
Information Leakage
24%
Knowledge Protocol
24%
Virtual Machine
24%
Internet-Of-Things
24%
Mobile Device
24%
Memory Access
21%
Privacy Preserving
21%
Blockchain
19%
Measurement Apparatus
18%
Main Component
18%
Specific Protocol
18%
random oracle model
18%
Modified Version
18%
public-key encryption
16%
Internal State
15%
Speed-up
15%
Computational Bottleneck
15%
Virtualizations
14%
Arithmetic Circuit
13%
Threat Model
12%
Communication Cost
12%
Table Lookup
12%
Memory Protection
12%
Memory Access Pattern
12%
Running Process
12%