Lattice-Based Public-Key Cryptography in Hardware

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It in...

Full description

Bibliographic Details
Main Authors: Sinha Roy, Sujoy, Verbauwhede, Ingrid (Author)
Format: eBook
Language:English
Published: Singapore Springer Nature Singapore 2020, 2020
Edition:1st ed. 2020
Series:Computer Architecture and Design Methodologies
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02272nmm a2200349 u 4500
001 EB001885291
003 EBX01000000000000001048658
005 00000000000000.0
007 cr|||||||||||||||||||||
008 191202 ||| eng
020 |a 9789813299948 
100 1 |a Sinha Roy, Sujoy 
245 0 0 |a Lattice-Based Public-Key Cryptography in Hardware  |h Elektronische Ressource  |c by Sujoy Sinha Roy, Ingrid Verbauwhede 
250 |a 1st ed. 2020 
260 |a Singapore  |b Springer Nature Singapore  |c 2020, 2020 
300 |a XV, 101 p. 17 illus., 9 illus. in color  |b online resource 
505 0 |a Introduction -- Background -- Discrete Gaussian Sampling -- Ring-LWE Public Key Encryption Processor -- Modular Architecture for Somewhat Homomorphic Function Evaluation -- Recryption-Box Assisted Homomorphic Function Evaluation -- Conclusions and Future Work 
653 |a Cryptography 
653 |a Electronic circuits 
653 |a Data encryption (Computer science) 
653 |a Algebra 
653 |a Cryptology 
653 |a Order, Lattices, Ordered Algebraic Structures 
653 |a Electronic Circuits and Systems 
700 1 |a Verbauwhede, Ingrid  |e [author] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Computer Architecture and Design Methodologies 
028 5 0 |a 10.1007/978-981-32-9994-8 
856 4 0 |u https://doi.org/10.1007/978-981-32-9994-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 621.3815 
520 |a This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module