共 24 条
[11]
Garcia L. C. C., 2005, P C CRYPT MOR CRYPT
[12]
Gathen J., 2003, MODERN COMPUTER ALGE
[13]
Gentry C., 2009, THESIS STANFORD U ST
[14]
Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
[15]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[16]
Kalach K., 2005, The 3rd International IEEE-NEWCAS Conference (IEEE Cat. No. 05EX1015), P267
[17]
KARABUTSA A, 1962, DOKL AKAD NAUK SSSR+, V145, P293
[18]
López-Alt A, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1219
[19]
Munro I., 1973, Journal of Computer and System Sciences, V7, P189, DOI 10.1016/S0022-0000(73)80043-1
[20]
Rivest RonaldL., 1978, Found. Secure Comput., V4, P169