共 9 条
[1]
Fahsi Mahmoud, 2015, International Journal of Modern Education and Computer Science, V7, P16, DOI 10.5815/ijmecs.2015.05.03
[2]
Fan J., 2012, IACR Cryptol. ePrint Arch
[3]
Fully Homomorphic Encryption Using Ideal Lattices
[J].
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2009,
:169-178
[4]
Li HG, 2017, Arxiv, DOI arXiv:1711.01030
[6]
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[8]
Singh SR, 2016, 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), P13, DOI 10.1109/ICACDOT.2016.7877543