Fully Homomorphic Encryption in Real World Applications (Record no. 76333)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03073nam a22005295i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-13-6393-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801214426.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190329s2019 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811363931 |
-- | 978-981-13-6393-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3815 |
100 1# - AUTHOR NAME | |
Author | Chatterjee, Ayantika. |
245 10 - TITLE STATEMENT | |
Title | Fully Homomorphic Encryption in Real World Applications |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VII, 141 p. 40 illus., 6 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Computer Architecture and Design Methodologies, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Mathematical Background -- Searching and Sorting on Encrypted Data -- Translating Algorithms to Handle Fully Homomorphic Encrypted Data -- Secure Database Handling -- Encrypted Processor Design -- Conclusion. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications. |
700 1# - AUTHOR 2 | |
Author 2 | Aung, Khin Mi Mi. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-13-6393-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic circuits. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Electronic Circuits and Systems. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2367-3486 |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.