Login / Signup

Obfuscating branch decisions based on encrypted data using MISR and hash digests.

Nektarios Georgios TsoutsosMichail Maniatakos
Published in: AsianHOST (2017)
Keyphrases
  • dynamic allocation
  • data structure
  • third party
  • encryption scheme
  • hash functions
  • encryption algorithm
  • read write