Keyphrases
Coding Approach
33%
Computer-assisted
33%
Cryptanalysis
33%
Cryptographic
66%
Cryptographic Security
100%
Cryptographic Solutions
33%
Encoding Method
33%
Energy Efficiency
33%
Evaluation Approach
33%
Frodo
66%
Internet of Things
100%
Internet of Things Devices
33%
Key Exchange Algorithm
66%
Lattice-based
33%
Layer Approach
33%
NewHope
66%
Physical Layer
100%
Physical Layer Secrecy
33%
Physical Security
100%
Polar Codes
33%
Post-quantum
33%
Quantum Computer
33%
Quantum Cryptanalysis
33%
Receiving Equipment
33%
Secrecy Coding
66%
Security Architecture
33%
Security Community
33%
Security Protocols
33%
Security Solutions
100%
Short-range Wireless Communication
33%
Total Energy Consumption
33%
Wireless Communication
33%
INIS
algorithms
33%
architecture
16%
communities
16%
cryptography
100%
devices
66%
efficiency
100%
energy
33%
energy consumption
16%
energy efficiency
16%
evaluation
16%
immunity
16%
implementation
16%
internet
100%
layers
100%
modeling
16%
quantum computers
16%
range
16%
security
100%
simulation
16%
solutions
100%
Computer Science
Coding Technique
25%
Cryptanalysis
50%
Energy Efficiency
25%
Evaluation Approach
25%
Internet of Things Device
25%
Internet-Of-Things
100%
Layer Approach
25%
Modeling and Simulation
25%
Physical Layer
100%
Quantum Computer
25%
Receiving Device
25%
Security Architecture
25%
Security Community
25%
Security protocols
25%
Security Solution
100%
Total Energy Consumption
25%
Transmitting Device
25%
Wireless Communication
50%