Login / Signup
Signatures Resilient to Continual Leakage on Memory and Computation.
Tal Malkin
Isamu Teranishi
Yevgeniy Vahlis
Moti Yung
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
limited memory
memory requirements
memory usage
memory size
databases
efficient computation
signature scheme
memory space