000 03192nam a22005655i 4500
001 978-981-32-9994-8
003 DE-He213
005 20220801213506.0
007 cr nn 008mamaa
008 191112s2020 si | s |||| 0|eng d
020 _a9789813299948
_9978-981-32-9994-8
024 7 _a10.1007/978-981-32-9994-8
_2doi
050 4 _aTK7867-7867.5
072 7 _aTJFC
_2bicssc
072 7 _aTEC008010
_2bisacsh
072 7 _aTJFC
_2thema
082 0 4 _a621.3815
_223
100 1 _aSinha Roy, Sujoy.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_932385
245 1 0 _aLattice-Based Public-Key Cryptography in Hardware
_h[electronic resource] /
_cby Sujoy Sinha Roy, Ingrid Verbauwhede.
250 _a1st ed. 2020.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2020.
300 _aXV, 101 p. 17 illus., 9 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputer Architecture and Design Methodologies,
_x2367-3486
505 0 _aIntroduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
520 _aThis book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
650 0 _aElectronic circuits.
_919581
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aAlgebra.
_921222
650 1 4 _aElectronic Circuits and Systems.
_932386
650 2 4 _aCryptology.
_931769
650 2 4 _aOrder, Lattices, Ordered Algebraic Structures.
_932387
700 1 _aVerbauwhede, Ingrid.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_932388
710 2 _aSpringerLink (Online service)
_932389
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789813299931
776 0 8 _iPrinted edition:
_z9789813299955
776 0 8 _iPrinted edition:
_z9789813299962
830 0 _aComputer Architecture and Design Methodologies,
_x2367-3486
_932390
856 4 0 _uhttps://doi.org/10.1007/978-981-32-9994-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75240
_d75240