共 23 条
- [2] BEST R., 1980, Proceedings of the IEEE Spring Compcon, P466
- [3] BHATTACHARJEE B, 2006, DAMON 06
- [4] Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
- [6] Garfinkel T., 2003, P 19 ACM S OP SYST P, P14, DOI 10.1145/945445.945464
- [7] GELMANN R, 2009, WPF REPORT PRIVACY C
- [8] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [9] GUILLOU LC, 1992, CONT CRYPTOLOGY SCI
- [10] Gutmann P, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P97