Engineering & Materials Science
Side channel attack
100%
Radio frequency identification (RFID)
49%
Websites
39%
Touch screens
34%
Computer hardware
33%
Electronic voting
30%
Remanence
28%
Static random access storage
28%
Internet of things
25%
Data storage equipment
24%
Electric power utilization
22%
Cryptography
22%
Authentication
22%
Internet
19%
Smartphones
19%
Dynamic random access storage
18%
Digital television
16%
Public key cryptography
14%
Web browsers
14%
Jamming
14%
Reverse engineering
14%
Cellular telephones
14%
Supply chains
13%
Television
13%
Routers
13%
HTML
12%
Gyroscopes
12%
Costs
12%
Machine learning
10%
Program processors
9%
Firmware
9%
Sensors
9%
Headphones
9%
Wi-Fi
8%
Malware
8%
Cloning
8%
Flow graphs
8%
Smart cards
7%
Ethers
7%
Monitoring
7%
Flow control
6%
Random access storage
6%
Security of data
6%
Television standards
6%
Programmable logic controllers
6%
Specifications
6%
Ethernet
6%
Sensor nodes
6%
Virtual machine
6%
Deep learning
6%
Mathematics
Attack
39%
Radio Frequency Identification
29%
Side Channel Attacks
28%
Trace
14%
Cipher
13%
Power Consumption
13%
Password
12%
Profiling
12%
Side-channel Analysis
11%
Template
11%
Advanced Encryption Standard
11%
Smart Card
10%
Reverse Engineering
9%
Algebraic Attack
9%
Privacy
9%
Fingerprint
9%
Supply Chain
8%
Power Analysis
8%
Leakage
8%
Hamming Weight
8%
Clone
7%
Trade-offs
7%
Optimization
6%
Monitoring
6%
Cryptanalysis
6%
User Studies
5%
User Interaction
5%
Decay
5%