共 31 条
[1]
Ames S, 2020, SECURE HLTH MONITORI, P56, DOI [10.4018/978-1-5225-9863-3.ch004, DOI 10.4018/978-1-5225-9863-3.CH004]
[2]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[3]
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:868-886
[4]
Homomorphic Encryption for Arithmetic of Approximate Numbers
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I,
2017, 10624
:409-437
[5]
Dung Hoang Duong, 2016, Tatra Mountains Mathematical Publications, V67, P69, DOI [10.1515/tmmp-2016-0031, 10.1515/tmmp-2016-0031]
[6]
Fan J., 2012, IACR CRYPTOLOGY EPRI
[7]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[8]
Halevi S, 2014, LECT NOTES COMPUT SC, V8616, P554, DOI 10.1007/978-3-662-44371-2_31