Computer Science
Computer Hardware
100%
Cryptocurrency
62%
Execution Environments
50%
Authentication
50%
Computation Cost
50%
Multiple Instance
50%
Parallel Computation
50%
Parallelization
50%
Encryption Scheme
50%
Cryptographic Protocol
50%
Building-Blocks
50%
Obfuscation
50%
Signature Scheme
50%
Single Message
50%
Blockchain
50%
Quantum Operation
50%
Communication Complexity
50%
secure multiparty computation
50%
Decryption
50%
Bitcoin
37%
Input Function
29%
Input/Output
25%
Modified Version
16%
Security Parameter
12%
Potential Threat
12%
Protocol Execution
12%
Polynomial Time
12%
Fully Homomorphic Encryption
12%
Malicious Adversary
12%
Boolean Function
12%
Mathematics
Decryption
50%
Inner Product
16%
Long Line
16%
Input Function
16%