Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Memory access pattern 7 found (84 total)

alternate case: memory access pattern

Balloon hashing (261 words) [view diff] exact match in snippet view article find links to article

g., SHA-3, SHA-512), is resistant to side-channel attacks: the memory access pattern is independent of the data to be hashed, is easy to implement and
Oblivious RAM (3,993 words) [view diff] exact match in snippet view article find links to article
access patterns of the transformed algorithm is independent of the memory access pattern of the original algorithm. The use of ORAMs is motivated by the
Oblivious data structure (1,344 words) [view diff] exact match in snippet view article find links to article
structure comes in practical, the secure processor can obfuscate memory access pattern in a provably secure manner. Secure computation: Traditionally people
Memory-hard function (819 words) [view diff] exact match in snippet view article find links to article
data-independent memory-hard functions (iMHF). As opposed to iMHFs, the memory access pattern of a dMHF depends on the function input, such as the password provided
AoS and SoA (921 words) [view diff] exact match in snippet view article find links to article
g., size of a cacheline). The tiled storage of AoSoA aligns the memory access pattern to the requests' fixed width, leading to fewer access operations
Gray code (15,876 words) [view diff] exact match in snippet view article find links to article
As the execution of program code typically causes an instruction memory access pattern of locally consecutive addresses, bus encodings using Gray code
Parallel multidimensional digital signal processing (3,692 words) [view diff] exact match in snippet view article find links to article
.. } } } } This caching technique is used to hide poor data to memory access pattern efficiency in terms of coalescing. However, with each successive