Login / Signup
Transporting a Secret Using Destructively-Read Memory.
Bruce Christianson
Alex Shafarenko
Published in:
Security Protocols Workshop (2023)
Keyphrases
</>
memory requirements
memory space
memory size
main memory
limited memory
secret sharing
case study
memory usage
secret sharing scheme
data sets
secret key