Login / Signup
Obfuscating branch decisions based on encrypted data using MISR and hash digests.
Nektarios Georgios Tsoutsos
Michail Maniatakos
Published in:
AsianHOST (2017)
Keyphrases
</>
dynamic allocation
data structure
third party
encryption scheme
hash functions
encryption algorithm
read write