Login / Signup

Transporting a Secret Using Destructively-Read Memory.

Bruce ChristiansonAlex Shafarenko
Published in: Security Protocols Workshop (2023)
Keyphrases
  • memory requirements
  • memory space
  • memory size
  • main memory
  • limited memory
  • secret sharing
  • case study
  • memory usage
  • secret sharing scheme
  • data sets
  • secret key