Login / Signup
MAC Precomputation with Applications to Secure Memory.
Juan A. Garay
Vladimir Kolesnikov
Rae McLellan
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
memory usage
security issues
memory requirements
memory space
memory size
real time
data sets
lightweight
security requirements
user authentication
authentication scheme
low memory
covert channel