The modification of RSA algorithm to adapt fully homomorphic encryption algorithm in cloud computing
暂无分享,去创建一个
[1] Christophe Clavier,et al. Fault Analysis Study of IDEA , 2008, CT-RSA.
[2] D. H. Fowler,et al. The Binomial Coefficient Function , 1996 .
[3] Roberto Di Pietro,et al. Transparent security for cloud , 2010, SAC '10.
[4] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[5] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[6] Craig Gentry,et al. Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[7] Rune B. Lyngsø,et al. Lecture Notes I , 2008 .
[8] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[9] Vyas Sekar,et al. Verifiable resource accounting for cloud computing services , 2011, CCSW '11.
[10] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[11] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[12] Wasim A. Al-Hamdani,et al. Who can you trust in the cloud?: a review of security issues within cloud computing , 2011, InfoSecCD.