"Machine learning algorithms;Error analysis;Memory management;Machine learning;Hardware;Decoding;Security"

Masked Memory Primitive for Key Insulated Schemes

In practical security systems, it is difficult to keep secret keys protected against adversarial attacks. Key insulated schemes (KIS) are used to improve security by generating session keys that expire after a finite period of time. However, during …