Lattice-Based Public-Key Cryptography in Hardware: Computer Architecture and Design Methodologies
Autor Sujoy Sinha Roy, Ingrid Verbauwhedeen Limba Engleză Hardback – 25 noi 2019
Din seria Computer Architecture and Design Methodologies
- 18%
Preț: 907.76 lei - 24%
Preț: 787.09 lei - 15%
Preț: 618.23 lei - 15%
Preț: 622.51 lei - 15%
Preț: 620.47 lei - 18%
Preț: 862.54 lei - 15%
Preț: 618.83 lei - 18%
Preț: 701.59 lei - 15%
Preț: 610.01 lei - 20%
Preț: 786.86 lei - 18%
Preț: 904.82 lei - 15%
Preț: 613.12 lei -
Preț: 397.48 lei - 18%
Preț: 912.05 lei - 15%
Preț: 627.34 lei - 18%
Preț: 966.69 lei - 24%
Preț: 743.17 lei
Preț: 403.97 lei
Puncte Express: 606
Carte tipărită la comandă
Livrare economică 01-15 iunie
Specificații
ISBN-13: 9789813299931
ISBN-10: 9813299932
Pagini: 120
Ilustrații: XV, 101 p. 17 illus., 9 illus. in color.
Dimensiuni: 160 x 241 x 13 mm
Greutate: 0.35 kg
Ediția:1st ed. 2020
Editura: Springer
Colecția Computer Architecture and Design Methodologies
Seria Computer Architecture and Design Methodologies
Locul publicării:Singapore, Singapore
ISBN-10: 9813299932
Pagini: 120
Ilustrații: XV, 101 p. 17 illus., 9 illus. in color.
Dimensiuni: 160 x 241 x 13 mm
Greutate: 0.35 kg
Ediția:1st ed. 2020
Editura: Springer
Colecția Computer Architecture and Design Methodologies
Seria Computer Architecture and Design Methodologies
Locul publicării:Singapore, Singapore
Cuprins
Introduction.- Background.- Discrete Gaussian Sampling.- Ring-LWE Public Key Encryption Processor.- Modular Architecture for Somewhat Homomorphic Function Evaluation.- Recryption-Box Assisted Homomorphic Function Evaluation.- Conclusions and Future Work.
Textul de pe ultima copertă
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.