Login / Signup
Transporting a Secret Using Destructively-Read Memory (Transcript of Discussion).
Alex Shafarenko
Published in:
Security Protocols Workshop (2023)
Keyphrases
</>
memory usage
limited memory
memory space
database
data sets
memory requirements
computational power
random access
video sequences
main memory
associative memory
literature review
secret key
past experience
memory size