Keyphrases
3D Integration
12%
3D Integration Technology
12%
Access Pattern
12%
Always Encrypted
12%
Architectural Design
12%
Attack Model
12%
Attacker
25%
Counter Mode Encryption
12%
Data Integrity
12%
Data Pattern
12%
Data Remanence
12%
Data Tampering
12%
Decrypt
12%
Decryption
12%
Encrypted Data
12%
Error Correction
12%
Error Correction Codes
12%
Error Detection
12%
Fast System
12%
Hardware Logic
12%
In-memory
25%
In-memory Logic
12%
Integrated Circuits
12%
Integrity Checking
25%
Integrity Verification
12%
Low Leakage Power
12%
Memory Architecture
12%
Memory Bus
25%
Memory chip
37%
Memory Content
12%
Memory Systems
12%
Non-volatile Memory
100%
Non-volatility
12%
Nonvolatile Memory Technologies
12%
Obfuscation
12%
Power System
12%
Repurposing
12%
Retrieve Data
12%
Security Issues
12%
State Register
12%
Trust-based
12%
Vertically Stacked
12%
Vulnerability
12%
Computer Science
Access Pattern
11%
And-States
11%
Architecture Design
11%
Attack Model
11%
Attackers
22%
Data Integrity
11%
Data Remanence
11%
Decryption
11%
Error Correction
11%
Error Correction Code
11%
Error Detection
11%
In-Memory Processing
33%
Integrated Circuits
11%
Integration Technology
11%
Integrity Check
11%
Integrity Checking
11%
Integrity Verification
11%
Memory Architecture
11%
Memory Command
11%
Memory Content
11%
Memory System
11%
Memory Technology
11%
Non-Volatile Memory
100%
Security Challenge
11%