000 | 03192nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-981-32-9994-8 | ||
003 | DE-He213 | ||
005 | 20220801213506.0 | ||
007 | cr nn 008mamaa | ||
008 | 191112s2020 si | s |||| 0|eng d | ||
020 |
_a9789813299948 _9978-981-32-9994-8 |
||
024 | 7 |
_a10.1007/978-981-32-9994-8 _2doi |
|
050 | 4 | _aTK7867-7867.5 | |
072 | 7 |
_aTJFC _2bicssc |
|
072 | 7 |
_aTEC008010 _2bisacsh |
|
072 | 7 |
_aTJFC _2thema |
|
082 | 0 | 4 |
_a621.3815 _223 |
100 | 1 |
_aSinha Roy, Sujoy. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _932385 |
|
245 | 1 | 0 |
_aLattice-Based Public-Key Cryptography in Hardware _h[electronic resource] / _cby Sujoy Sinha Roy, Ingrid Verbauwhede. |
250 | _a1st ed. 2020. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2020. |
|
300 |
_aXV, 101 p. 17 illus., 9 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aComputer Architecture and Design Methodologies, _x2367-3486 |
|
505 | 0 | _aIntroduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work. | |
520 | _aThis book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module. | ||
650 | 0 |
_aElectronic circuits. _919581 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aAlgebra. _921222 |
|
650 | 1 | 4 |
_aElectronic Circuits and Systems. _932386 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aOrder, Lattices, Ordered Algebraic Structures. _932387 |
700 | 1 |
_aVerbauwhede, Ingrid. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _932388 |
|
710 | 2 |
_aSpringerLink (Online service) _932389 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789813299931 |
776 | 0 | 8 |
_iPrinted edition: _z9789813299955 |
776 | 0 | 8 |
_iPrinted edition: _z9789813299962 |
830 | 0 |
_aComputer Architecture and Design Methodologies, _x2367-3486 _932390 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-32-9994-8 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75240 _d75240 |