Cryptography Against Continuous Memory Attacks.
Yevgeniy DodisKristiyan HaralambievAdriana López-AltDaniel WichsPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- countermeasures
- cellular automata
- cryptographic algorithms
- information security
- malicious attacks
- watermarking scheme
- cryptographic protocols
- computing power
- security protocols
- data corruption
- traffic analysis
- memory size
- security threats
- memory requirements
- computer security
- memory management
- limited memory
- continuous domains
- memory usage
- operating system