Improving the Efficiency of Homomorphic Encryption Schemes
暂无分享,去创建一个
[1] Chris Clifton,et al. Privacy-preserving distributed data mining and processing on horizontally partitioned data , 2005 .
[2] M. McLoone,et al. Fast Montgomery modular multiplication and RSA cryptographic processor architectures , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
[3] Craig Gentry,et al. Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[4] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[5] Phong Q. Nguyen,et al. BKZ 2.0: Better Lattice Security Estimates , 2011, ASIACRYPT.
[6] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[9] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[10] Keisuke Tanaka,et al. Multi-bit Cryptosystems Based on Lattice Problems , 2007, Public Key Cryptography.
[11] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[12] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[13] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[14] Dirk Westhoff,et al. Optimized Implementation of Elliptic Curve Based Additive Homomorphic Encryption for Wireless Sensor Networks , 2007 .
[15] Aggelos Kiayias,et al. Financial Cryptography and Data Security , 2008 .
[16] Nicolas Gama,et al. Predicting Lattice Reduction , 2008, EUROCRYPT.
[17] Craig Gentry,et al. Fully Homomorphic Encryption without Bootstrapping , 2011, IACR Cryptol. ePrint Arch..
[18] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[19] Arnold Schönhage,et al. Schnelle Multiplikation großer Zahlen , 1971, Computing.
[20] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[21] George Danezis,et al. Financial cryptography and data security : 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28-March 4, 2011 : revised selected papers , 2011 .
[22] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[23] Javier Herranz,et al. Additively Homomorphic Encryption with d-Operand Multiplications , 2010, IACR Cryptol. ePrint Arch..
[24] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[25] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[26] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[27] Charles C. Weems,et al. High Precision Integer Multiplication with a GPU Using Strassen's Algorithm with Multiple FFT Sizes , 2011, Parallel Process. Lett..
[28] Frederik Armknecht,et al. A New Approach for Algebraically Homomorphic Encryption , 2008, IACR Cryptol. ePrint Arch..
[29] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[30] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[31] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[32] Berk Sunar,et al. Accelerating fully homomorphic encryption using GPU , 2012, 2012 IEEE Conference on High Performance Extreme Computing.
[33] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[34] Arnaud Tisserand,et al. Comparison of Modular Arithmetic Algorithms on GPUs , 2009, PARCO.
[35] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[36] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[37] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[38] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[39] P. L. Montgomery. Modular multiplication without trial division , 1985 .
[40] William P. Marnane,et al. Efficient architectures for implementing montgomery modular multiplication and RSA modular exponentiation on reconfigurable logic , 2002, FPGA '02.
[41] Claus-Peter Schnorr,et al. Lattice basis reduction: Improved practical algorithms and solving subset sum problems , 1991, FCT.
[42] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[43] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[44] Ron Steinfeld,et al. Making NTRU as Secure as Worst-Case Problems over Ideal Lattices , 2011, EUROCRYPT.
[45] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[46] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[47] Philippe Gaborit,et al. Lattice-based homomorphic encryption of vector spaces , 2008, 2008 IEEE International Symposium on Information Theory.
[48] Chris Peikert,et al. Better Key Sizes (and Attacks) for LWE-Based Encryption , 2011, CT-RSA.
[49] Ivan Damgård,et al. A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.
[50] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[51] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.