Towards cryptographically-authenticated in-memory data structures.
Setareh GhorshiLachlan J. GunnHans LiljestrandN. AsokanPublished in: SecDev (2022)
Keyphrases
- data structure
- main memory
- external memory
- memory usage
- hash table
- bloom filter
- memory requirements
- efficient data structures
- data structures and algorithms
- low memory
- computing power
- memory space
- computational power
- key agreement protocol
- quadtree
- key exchange
- database
- kd trees
- memory size
- key distribution
- limited memory
- data types