共 27 条
- [11] Gentry Craig, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P19, DOI 10.1007/978-3-642-32928-9_2
- [12] Gentry C, 2013, LECT NOTES COMPUT SC, V8042, P75, DOI 10.1007/978-3-642-40041-4_5
- [13] Gentry C, 2012, LECT NOTES COMPUT SC, V7293, P1, DOI 10.1007/978-3-642-30057-8_1
- [14] Gentry C, 2012, LECT NOTES COMPUT SC, V7237, P465, DOI 10.1007/978-3-642-29011-4_28
- [15] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [16] Goldwasser S., 1982, P 14 ANN ACM S THEOR, P365, DOI DOI 10.1145/800070.802212
- [17] Graepel Thore, 2013, Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, P1, DOI 10.1007/978-3-642-37682-5_1
- [18] Gribov A, 2018, GROUPS COMPLEXITY CR, V10
- [19] Halevi Shai, 2020, Cryptology ePrint Archive
- [20] Kim Miran, 2015, 2015965 CRYPT EPRINT