Login / Signup
MAC Precomputation with Applications to Secure Memory.
Juan A. Garay
Vladimir Kolesnikov
Rae McLellan
Published in:
ISC (2009)
Keyphrases
</>
memory requirements
memory space
lightweight
memory usage
computing power
limited memory
authentication protocol
memory size
low memory
covert channel
database
information systems
security issues
sensitive data
random access
security analysis