Secure transactions in a memory fabric
Abstract:
In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
Public/Granted literature
Information query
Patent Agency Ranking
0/0