Login / Signup

Towards cryptographically-authenticated in-memory data structures.

Setareh GhorshiLachlan J. GunnHans LiljestrandN. Asokan
Published in: CoRR (2022)
Keyphrases
  • data structure
  • main memory
  • external memory
  • bloom filter
  • memory requirements
  • limited memory
  • data types
  • computing power
  • hash table
  • database
  • memory size
  • index structure
  • b tree
  • suffix tree
  • efficient data structures