Tree Parity Machine Rekeying Architectures for Embedded Security.
Markus VolkmerSebastian WallnerPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- authentication protocol
- security analysis
- tree structure
- real time embedded
- error correction
- index structure
- data structure
- r tree
- b tree
- binary tree
- intrusion detection
- security issues
- batch processing
- multi dimensional
- computer security
- functional requirements
- tree structures
- security requirements
- statistical databases
- spanning tree
- decision trees
- network security
- embedded systems
- flowshop
- energy consumption