共 34 条
[1]
Ames S., 2015, ENABLING REAL TIME M, P116
[2]
[Anonymous], 2004, USENIX SEC S
[4]
Barker E., 2012, NIST SPEC PUBL, P700
[5]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[6]
Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
[8]
Efficient Fully Homomorphic Encryption from (Standard) LWE
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:97-106
[9]
Bugiel S, 2011, LECT NOTES COMPUT SC, V7025, P32, DOI 10.1007/978-3-642-24712-5_3
[10]
Burkhart M., 2010, P 19 USENIX C SEC WA