Mathematics
Encryption
45%
Bloom Filter
37%
Oblivious Transfer
36%
Pseudorandom Function
36%
Query
29%
Authentication
27%
Hashing
26%
Server
26%
Zero-knowledge Proof
25%
Retrieval
24%
Secret Sharing
24%
Proof System
24%
Quorum
23%
Reuse
22%
Broadcasting
22%
Receiver
21%
Randomness
21%
Data Structures
20%
Traitor Tracing
19%
Model
18%
Electronics
18%
Visual Cryptography
18%
Leakage
17%
Privacy
17%
Cryptography
16%
Hash Function
16%
One-way Function
16%
Hardness
15%
Zero-knowledge
15%
Spam
14%
History
14%
Permutation
14%
Authentication Protocol
14%
Cryptographic Protocols
14%
Language
14%
Subset
13%
Distributed Hash Table
13%
Secret Sharing Scheme
13%
Game
13%
Trade-offs
12%
Public-key Cryptosystem
12%
Signature
12%
Fairness
12%
Public Key Encryption
12%
Methodology
11%
Communication
11%
Logarithmic
11%
Lower bound
11%
Commitment
11%
Tracing
10%
Engineering & Materials Science
Cryptography
100%
Data storage equipment
55%
Polynomials
42%
Authentication
41%
Hardness
31%
Hash functions
30%
Communication
28%
Servers
27%
Microfilm
26%
Data structures
24%
Network protocols
21%
Information retrieval
20%
Broadcasting
16%
Set theory
15%
Parallel algorithms
15%
Glossaries
15%
Coloring
14%
Labeling
13%
Sampling
11%
Side channel attack
10%
Function evaluation
10%
Networks (circuits)
9%
Distributed computer systems
8%
Flavors
8%
Random variables
7%
Binary trees
7%
Block codes
7%
Compressibility
7%
Simulators
7%
Public key cryptography
6%
Mirrors
6%
Transparency
6%
Seals
6%
Access control
6%
Random access storage
6%
Network routing
5%
Availability
5%
Agglomeration
5%
Computability and decidability
5%
Decoding
5%
Entropy
5%
Acoustic waves
5%
Dynamical systems
5%
Television
5%
Testing
5%
Formal languages
5%