Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Fully Homomorphic Encryption in Real...
~
SpringerLink (Online service)
Fully Homomorphic Encryption in Real World Applications
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Fully Homomorphic Encryption in Real World Applications/ by Ayantika Chatterjee, Khin Mi Mi Aung.
Author:
Chatterjee, Ayantika.
other author:
Aung, Khin Mi Mi.
Description:
VII, 141 p. 40 illus., 6 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer security. -
Online resource:
https://doi.org/10.1007/978-981-13-6393-1
ISBN:
9789811363931
Fully Homomorphic Encryption in Real World Applications
Chatterjee, Ayantika.
Fully Homomorphic Encryption in Real World Applications
[electronic resource] /by Ayantika Chatterjee, Khin Mi Mi Aung. - 1st ed. 2019. - VII, 141 p. 40 illus., 6 illus. in color.online resource. - Computer Architecture and Design Methodologies,2367-3478. - Computer Architecture and Design Methodologies,.
Introduction -- Mathematical Background -- Searching and Sorting on Encrypted Data -- Translating Algorithms to Handle Fully Homomorphic Encrypted Data -- Secure Database Handling -- Encrypted Processor Design -- Conclusion.
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.
ISBN: 9789811363931
Standard No.: 10.1007/978-981-13-6393-1doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: TK7888.4
Dewey Class. No.: 621.3815
Fully Homomorphic Encryption in Real World Applications
LDR
:02488nam a22004095i 4500
001
1009537
003
DE-He213
005
20200703142641.0
007
cr nn 008mamaa
008
210106s2019 si | s |||| 0|eng d
020
$a
9789811363931
$9
978-981-13-6393-1
024
7
$a
10.1007/978-981-13-6393-1
$2
doi
035
$a
978-981-13-6393-1
050
4
$a
TK7888.4
072
7
$a
TJFC
$2
bicssc
072
7
$a
TEC008010
$2
bisacsh
072
7
$a
TJFC
$2
thema
082
0 4
$a
621.3815
$2
23
100
1
$a
Chatterjee, Ayantika.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1303489
245
1 0
$a
Fully Homomorphic Encryption in Real World Applications
$h
[electronic resource] /
$c
by Ayantika Chatterjee, Khin Mi Mi Aung.
250
$a
1st ed. 2019.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2019.
300
$a
VII, 141 p. 40 illus., 6 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
505
0
$a
Introduction -- Mathematical Background -- Searching and Sorting on Encrypted Data -- Translating Algorithms to Handle Fully Homomorphic Encrypted Data -- Secure Database Handling -- Encrypted Processor Design -- Conclusion.
520
$a
This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.
650
0
$a
Computer security.
$3
557122
650
0
$a
Electronic circuits.
$3
563332
650
1 4
$a
Circuits and Systems.
$3
670901
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Electronic Circuits and Devices.
$3
782968
700
1
$a
Aung, Khin Mi Mi.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1303490
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811363924
776
0 8
$i
Printed edition:
$z
9789811363948
776
0 8
$i
Printed edition:
$z
9789811363955
830
0
$a
Computer Architecture and Design Methodologies,
$x
2367-3478
$3
1269988
856
4 0
$u
https://doi.org/10.1007/978-981-13-6393-1
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login