語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
到查詢結果
[ subject:"Order, Lattices, Ordered Algebraic Structures." ]
切換:
標籤
|
MARC模式
|
ISBD
Lattice-based public-key cryptograph...
~
Sinha Roy, Sujoy.
Lattice-based public-key cryptography in hardware
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Lattice-based public-key cryptography in hardwareby Sujoy Sinha Roy, Ingrid Verbauwhede.
作者:
Sinha Roy, Sujoy.
其他作者:
Verbauwhede, Ingrid.
出版者:
Singapore :Springer Singapore :2020.
面頁冊數:
xv, 101 p. :ill. (some col.), digital ;24 cm.
Contained By:
Springer eBooks
標題:
Public key cryptography.
電子資源:
https://doi.org/10.1007/978-981-32-9994-8
ISBN:
9789813299948$q(electronic bk.)
Lattice-based public-key cryptography in hardware
Sinha Roy, Sujoy.
Lattice-based public-key cryptography in hardware
[electronic resource] /by Sujoy Sinha Roy, Ingrid Verbauwhede. - Singapore :Springer Singapore :2020. - xv, 101 p. :ill. (some col.), digital ;24 cm. - Computer architecture and design methodologies,2367-3478. - Computer architecture and design methodologies..
Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
ISBN: 9789813299948$q(electronic bk.)
Standard No.: 10.1007/978-981-32-9994-8doiSubjects--Topical Terms:
214979
Public key cryptography.
LC Class. No.: TK5102.94 / .S564 2020
Dewey Class. No.: 005.824
Lattice-based public-key cryptography in hardware
LDR
:02127nmm a2200337 a 4500
001
574112
003
DE-He213
005
20200316103926.0
006
m d
007
cr nn 008maaau
008
201007s2020 si s 0 eng d
020
$a
9789813299948$q(electronic bk.)
020
$a
9789813299931$q(paper)
024
7
$a
10.1007/978-981-32-9994-8
$2
doi
035
$a
978-981-32-9994-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5102.94
$b
.S564 2020
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
TK5102.94
$b
.S617 2020
100
1
$a
Sinha Roy, Sujoy.
$3
861681
245
1 0
$a
Lattice-based public-key cryptography in hardware
$h
[electronic resource] /
$c
by Sujoy Sinha Roy, Ingrid Verbauwhede.
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xv, 101 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Computer architecture and design methodologies,
$x
2367-3478
505
0
$a
Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work.
520
$a
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
650
0
$a
Public key cryptography.
$3
214979
650
1 4
$a
Circuits and Systems.
$3
274416
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Order, Lattices, Ordered Algebraic Structures.
$3
275673
700
1
$a
Verbauwhede, Ingrid.
$3
861682
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer architecture and design methodologies.
$3
753537
856
4 0
$u
https://doi.org/10.1007/978-981-32-9994-8
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000180378
電子館藏
1圖書
電子書
EB TK5102.94 .S617 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-32-9994-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入