共 11 条
[1]
Aguilar-Melchor Carlos, 2016, Proceedings on Privacy Enhancing Technologies, V2016, P155, DOI 10.1515/popets-2016-0010
[2]
Angel S., 2017, INT C SECURITY PRIVA
[3]
Aubry, CT RSA, P345
[4]
Compiling Low Depth Circuits for Practical Secure Computation
[J].
COMPUTER SECURITY - ESORICS 2016, PT II,
2016, 9879
:80-98
[5]
A Multi-start Heuristic for Multiplicative Depth Minimization of Boolean Circuits
[J].
COMBINATORIAL ALGORITHMS, IWOCA 2017,
2018, 10765
:275-286
[6]
Chatterjee A., 2015, IACR Cryptol. ePrint Arch., V2015, P981
[7]
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I,
2016, 10031
:3-33
[8]
Fan J., 2012, IACR Cryptol. ePrint Arch., V2012, P144
[10]
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption
[J].
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017,
2018, 238
:128-146