Login / Signup
Cryptography against Continuous Memory Attacks.
Yevgeniy Dodis
Kristiyan Haralambiev
Adriana López-Alt
Daniel Wichs
Published in:
FOCS (2010)
Keyphrases
</>
cellular automata
countermeasures
memory requirements
cryptographic algorithms
information security
memory size
memory usage
cryptographic protocols
database systems
associative memory
continuous variables
memory management
malicious attacks
computing power