Login / Signup
MAC Precomputation with Applications to Secure Memory.
Juan A. Garay
Vladimir Kolesnikov
Rae McLellan
Published in:
ACM Trans. Priv. Secur. (2016)
Keyphrases
</>
memory requirements
memory usage
computing power
memory space
limited memory
memory size
computer systems
lightweight
standard model
neural network
data structure
random access
application level
covert channel