共 21 条
- [1] [Anonymous], 2012, 2012_IEEE_conference_on_high performance_extreme_computing, DOI [10.1109/HPEC.2012.6408660, DOI 10.1109/HPEC.2012.6408660, DOI 10.1109/PEAM.2012.6612493]
- [3] Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
- [5] Cheon J.H., 2015, WAHC 15 3 WORKSH ENC
- [6] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [7] Graepel Thore, 2013, Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, P1, DOI 10.1007/978-3-642-37682-5_1
- [9] Hazay C, 2010, INFORM SEC CRYPT TEX, P3, DOI 10.1007/978-3-642-14303-8