Mathematics
Oblivious Transfer
89%
Secure Computation
72%
Server
51%
Intersection
43%
Privacy Preserving Data Mining
39%
Zero-knowledge Proof
29%
Secure multi-party Computation
27%
Multiparty Computation
27%
Computing
23%
Pseudorandom Function
23%
Communication
23%
Key Management
23%
Proof System
22%
Private Information Retrieval
22%
Choose
22%
Hashing
19%
Privacy Preserving
18%
Cryptography
18%
Commitment
18%
Bloom Filter
16%
Hamming Distance
15%
Privacy
14%
Receiver
14%
Compiler
13%
Black Box
13%
Traitor Tracing
12%
Attack
12%
Authentication
12%
Keyword Search
12%
Bandwidth
12%
Random Oracle Model
11%
Compiler Optimization
11%
Cryptographic Protocols
11%
Key Recovery
10%
Threshold Signature
10%
Data Mining
10%
Interaction
10%
Polynomial Evaluation
10%
Model
9%
Communication Cost
9%
Encryption
8%
Linear Complexity
8%
Efficient Set
8%
Homomorphic
8%
Scenarios
8%
Client/server
8%
Secret Sharing Scheme
8%
Secret Sharing
8%
Amplification
8%
Hardware
8%
Engineering & Materials Science
Network protocols
100%
Servers
77%
Cryptography
71%
Communication
48%
Networks (circuits)
41%
Information retrieval
31%
Authentication
22%
Linux
17%
Function evaluation
17%
Hamming distance
16%
Data mining
16%
Electronic mail
16%
Polynomials
16%
Peer to peer networks
15%
Scalability
15%
Malware
14%
Random access storage
14%
Internet
14%
Glossaries
14%
Graphics processing unit
13%
Computer hardware
13%
Concretes
13%
Windows operating system
12%
Wages
11%
Web browsers
11%
Experiments
10%
Costs
10%
Machine learning
9%
Security of data
9%
Sorting
8%
Bandwidth
8%
Data structures
8%
Sales
7%
Watermarking
7%
Electronic document identification systems
7%
Large dataset
7%
Taxonomies
6%
Throughput
6%
Industry
6%
Amplification
6%
Deep neural networks
6%
Computational efficiency
6%
Defects
6%
Marketing
6%
Face recognition
6%
Lead
6%
Recovery
5%
Botnet
5%
Cloud computing
5%
Managers
5%