Mathematics
Attack
82%
Binary
9%
Block Ciphers
16%
Braid Group
9%
Calculus
15%
Cayley
11%
Collision
11%
Computing
9%
Countermeasures
26%
Cryptanalysis
47%
Cryptography
25%
Cryptosystem
10%
Curve
16%
Descent
12%
Digital Signature
8%
Discrete Logarithm Problem
51%
Elliptic Curves
64%
Encryption
9%
Endomorphism Ring
11%
Expander Graphs
11%
Factoring
16%
Fault Attacks
25%
Galois field
11%
Hash Function
57%
Heuristics
10%
Isogenies
50%
Isogeny
100%
Key Exchange
11%
Key Recovery
10%
Look-up Table
9%
Masking
18%
Maximal Order
8%
One-way Function
19%
Path
15%
Polynomial
9%
Polynomial Systems
27%
Polynomial-time Algorithm
8%
Pseudorandom number Generator
8%
Public key
15%
Public Key Encryption
8%
Quaternion
15%
Ramanujan Graphs
22%
Random Oracle Model
8%
Resistance
8%
Root-finding
17%
Side Channel Attacks
28%
Signature
16%
Signature Scheme
17%
Subfield
21%
Torsion Points
17%
Engineering & Materials Science
Cryptography
75%
Data storage equipment
9%
Electronic document identification systems
5%
Factorization
10%
Hardness
20%
Hash functions
52%
Network protocols
17%
Networks (circuits)
7%
Polynomials
69%
Public key cryptography
6%
Quantum cryptography
13%
Recovery
7%
Side channel attack
36%
Standardization
6%
Torsional stress
39%