Computer Science
Malicious Adversary
100%
Secure Protocol
100%
secure multiparty computation
75%
Enhanced Security
50%
Machine Learning
50%
Key Generation
50%
Privacy Preserving
50%
Cryptocurrency
50%
Secret Sharing
50%
Avoid Data Race
50%
Logic Programming
50%
Security and Privacy
50%
Oblivious Algorithm
25%
Decision Trees
25%
Denial of Service Attack
25%
Building-Blocks
25%
Smart Contract
25%
Exchange Service
25%
Malicious Behavior
25%
Experimental Result
25%
Password
25%
Cryptographic Operation
25%
Support Vector Machine
25%
Single Iteration
25%
Number Generator
16%
Minimal Distance
16%
Authentication Token
6%
Keyphrases
Commitment Scheme
50%
Miller-Rabin Test
50%
RSA Key Generation
50%
Homomorphic
50%
Universal Composability
50%
Linear Error Correcting Codes
33%
Homomorphic Commitments
33%
Erasure Decoding
16%
Error Correction
16%
Amortized Communication Complexity
16%
Commitment Protocol
16%
Technical Improvement
16%
Homomorphic Property
16%
Existing Buildings
16%
Use Code
16%
Extraction Properties
16%
RSA Modulus
16%
Threshold Implementation
16%
Secure multiplication
16%
Cryptosystem
16%
Divisibility
16%
Settings-based
16%
Primality Test
16%
Distributed Generation
16%
Advanced Cryptographic Protocols
16%
Malicious Adversary
16%
Minimal Distance
16%
Universal Composability Framework
16%
Efficient Decoding
16%