LEADER 04395nam 22006855 450 001 9910736002003321 005 20251008163638.0 010 $a9783031355356 010 $a3031355350 024 7 $a10.1007/978-3-031-35535-6 035 $a(MiAaPQ)EBC30670612 035 $a(Au-PeEL)EBL30670612 035 $a(DE-He213)978-3-031-35535-6 035 $a(PPN)272274208 035 $a(CKB)27899950900041 035 $a(OCoLC)1392342660 035 $a(EXLCZ)9927899950900041 100 $a20230801d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aHomomorphic Encryption for Financial Cryptography $eRecent Inventions and Challenges /$fedited by V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (302 pages) 311 08$aPrint version: Seethalakshmi, V. Homomorphic Encryption for Financial Cryptography Cham : Springer International Publishing AG,c2023 9783031355349 327 $aChapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual Cryptographic Authentication -- Chapter 4 Securing shared data based on Homomorphic encryption schemes -- Chapter 5 Challenges and Opportunities associated with Homomorphic Encryption for Financial Cryptography -- Chapter 6 Homomorphic Encryption based Cloud Privacy-Preserving in Remote Ecg Monitoring and Surveillance -- Chapter 7 Enhancing Encryption Security against Cypher Attacks -- Chapter 8 Biometric Based Key Generation Using AES Algorithm for Real Time Security Applications -- Chapter 9 Financial Cryptography and its application in Blockchain -- Chapter 10 Algorithmic Strategies for Solving Complex Problems in Financial Cryptography.,- Chapter 11 Various Attacks on the implementation of Cryptographic Algorithms -- Chapter 12 A Survey on Private Keyword Sorting and Searching using Homomorphic Encryption -- Chapter 13 Multivariate Cryptosystem Based on a Quadratic Equation to Eliminate the Outliers Using Homomorphic Encryption Scheme. . 330 $aThis book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-changer for the industry and cloud industry. HE method in cloud computing is presented in this book as a solution to increase the security of the data. Moreover, this book provides details about the set of fundamentals of cryptography, classical HE systems, properties of HE schemes, challenges and opportunities in HE methods, key infrastructure, problem of key management, key sharing, current algorithmic strategies and its limitation in implementation for solving complex problems in financial cryptography, application in blockchain, multivariate cryptosystems based on quadratic equations to avoid the explosion of the coefficients. . 606 $aData protection 606 $aFinancial engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection$xLaw and legislation 606 $aData and Information Security 606 $aFinancial Technology and Innovation 606 $aCryptology 606 $aPrivacy 615 0$aData protection. 615 0$aFinancial engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection$xLaw and legislation. 615 14$aData and Information Security. 615 24$aFinancial Technology and Innovation. 615 24$aCryptology. 615 24$aPrivacy. 676 $a005.824 700 $aSeethalakshmi$b V$01380449 701 $aDhanaraj$b Rajesh Kumar$01380450 701 $aSuganyadevi$b S$01380451 701 $aOuaissa$b Mariya$01380452 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910736002003321 996 $aHomomorphic Encryption for Financial Cryptography$93421888 997 $aUNINA