Login / Signup
Counter-light Memory Encryption.
Xin Wang
Jagadish Kotra
Alex Jones
Wenjie Xiong
Xun Jian
Published in:
ISCA (2024)
Keyphrases
</>
memory requirements
computing power
memory usage
security properties
low memory
real time
databases
neural network
image sequences
memory space
limited memory
memory management
light scattering