000923405 000__ 02730cam\a2200481Ii\4500 000923405 001__ 923405 000923405 005__ 20230306151025.0 000923405 006__ m\\\\\o\\d\\\\\\\\ 000923405 007__ cr\cn\nnnunnun 000923405 008__ 191118s2020\\\\si\a\\\\ob\\\\000\0\eng\d 000923405 019__ $$a1128031020$$a1128100579$$a1129168451$$a1129970323$$a1130760348 000923405 020__ $$a9789813299948$$q(electronic book) 000923405 020__ $$a9813299940$$q(electronic book) 000923405 020__ $$z9789813299931 000923405 020__ $$z9813299932 000923405 0247_ $$a10.1007/978-981-32-9994-8$$2doi 000923405 0247_ $$a10.1007/978-981-32-9 000923405 035__ $$aSP(OCoLC)on1127910249 000923405 035__ $$aSP(OCoLC)1127910249$$z(OCoLC)1128031020$$z(OCoLC)1128100579$$z(OCoLC)1129168451$$z(OCoLC)1129970323$$z(OCoLC)1130760348 000923405 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dYDX$$dLQU$$dUKMGB$$dOCLCF 000923405 049__ $$aISEA 000923405 050_4 $$aTK5102.94 000923405 08204 $$a005.8/24$$223 000923405 1001_ $$aSinha Roy, Sujoy,$$eauthor. 000923405 24510 $$aLattice-based public-key cryptography in hardware /$$cSujoy Sinha Roy, Ingrid Verbauwhede. 000923405 264_1 $$aSingapore :$$bSpringer,$$c[2020]. 000923405 300__ $$a1 online resource (xv, 101 pages) :$$billustrations. 000923405 336__ $$atext$$btxt$$2rdacontent 000923405 337__ $$acomputer$$bc$$2rdamedia 000923405 338__ $$aonline resource$$bcr$$2rdacarrier 000923405 4901_ $$aComputer architecture and design methodologies,$$x2367-3478 000923405 504__ $$aIncludes bibliographical references. 000923405 506__ $$aAccess limited to authorized users. 000923405 520__ $$aThis book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module. 000923405 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 18, 2019). 000923405 650_0 $$aPublic key cryptography. 000923405 7001_ $$aVerbauwhede, Ingrid,$$eauthor. 000923405 77608 $$iPrint version: $$z9813299932$$z9789813299931$$w(OCoLC)1110483630 000923405 830_0 $$aComputer architecture and design methodologies. 000923405 852__ $$bebk 000923405 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-981-32-9994-8$$zOnline Access$$91397441.1 000923405 909CO $$ooai:library.usi.edu:923405$$pGLOBAL_SET 000923405 980__ $$aEBOOK 000923405 980__ $$aBIB 000923405 982__ $$aEbook 000923405 983__ $$aOnline 000923405 994__ $$a92$$bISE