This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in
Lattice-Based Public-Key Cryptography in Hardware
β Scribed by Sujoy Sinha Roy, Ingrid Verbauwhede
- Publisher
- Springer Singapore
- Year
- 2020
- Tongue
- English
- Leaves
- 109
- Series
- Computer Architecture and Design Methodologies
- Edition
- 1st ed. 2020
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.
β¦ Table of Contents
Front Matter ....Pages i-xv
Introduction (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 1-6
Background (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 7-24
Coprocessor for Koblitz Curves (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 25-42
Discrete Gaussian Sampling (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 43-63
Ring-LWE Public Key Encryption Processor (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 65-81
Conclusions and Future Work (Sujoy Sinha Roy, Ingrid Verbauwhede)....Pages 83-85
Back Matter ....Pages 87-101
β¦ Subjects
Engineering; Circuits and Systems; Order, Lattices, Ordered Algebraic Structures
π SIMILAR VOLUMES
Cryptography, secret writing, is probably as old as writing in general. Only recently it has become the object of extensive scientific studies. Vast new applications to data security constitute one explanation for this. Perhaps a still more important reason for the huge growth of scientific resea
<p>Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryp
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptos