Login / Signup
Signatures Resilient to Continual Leakage on Memory and Computation.
Tal Malkin
Isamu Teranishi
Yevgeniy Vahlis
Moti Yung
Published in:
TCC (2011)
Keyphrases
</>
memory requirements
case study
evolutionary algorithm
signature verification
data sets
databases
neural network
information retrieval
image sequences
efficient computation
computing power
memory management
low memory