Login / Signup
Cryptography with Tamperable and Leaky Memory.
Yael Tauman Kalai
Bhavana Kanukurthi
Amit Sahai
Published in:
CRYPTO (2011)
Keyphrases
</>
memory requirements
cellular automata
memory usage
low memory
memory space
computing power
decision making
data structure
internal memory
database
memory capacity
memory size
limited memory
computational power
case study
web services
information systems
machine learning
data mining
databases