共 33 条
[1]
[Anonymous], 2009, STANFORD U
[2]
Bazett H. C., 1997, ANN NONINVAS ELECTRO, V2, P177, DOI DOI 10.1111/J.1542-474X.1997.TB00325.X
[3]
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[4]
Boldyreva A, 2009, LECT NOTES COMPUT SC, V5479, P224, DOI 10.1007/978-3-642-01001-9_13
[5]
Brakerski Z., 2012, ACM T COMPUTATION TH, P309
[6]
Efficient Fully Homomorphic Encryption from (Standard) LWE
[J].
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011),
2011,
:97-106
[9]
Coron JS, 2011, LECT NOTES COMPUT SC, V6841, P487, DOI 10.1007/978-3-642-22792-9_28
[10]
Fiore D., 2012, P 2012 ACM C COMP CO, P501