共 44 条
[2]
Albawi S, 2017, I C ENG TECHNOL
[3]
[Anonymous], 2019, Microsoft SEAL (Release 3.6)
[4]
Atkinson Kendall, 2005, Theoretical numerical analysis, V39
[5]
Fast Homomorphic Evaluation of Deep Discretized Neural Networks
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III,
2018, 10993
:483-512
[6]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[7]
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[8]
Chabanne H., 2017, IACR Cryptol. ePrint Arch., P1, DOI DOI 10.1109/WITS.2017.7934613
[9]
Chou ED, 2018, Arxiv, DOI [arXiv:1811.09953, DOI 10.48550/ARXIV.1811.09953]
[10]
Crawford J. L., 2018, P 6 WORKSH ENCR COMP