Fully Homomorphic Encryption with Polylog Overhead
暂无分享,去创建一个
[1] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[2] Abraham Waksman,et al. A Permutation Network , 1968, JACM.
[3] Yuval Ishai,et al. Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography , 2010, IACR Cryptol. ePrint Arch..
[4] Ron Steinfeld,et al. Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.
[5] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[6] Leslie G. Valiant,et al. A fast parallel algorithm for routing in permutation networks , 1981, IEEE Transactions on Computers.
[7] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[8] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[9] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[10] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[11] Sajal K. Das,et al. Book Review: Introduction to Parallel Algorithms and Architectures : Arrays, Trees, Hypercubes by F. T. Leighton (Morgan Kauffman Pub, 1992) , 1992, SIGA.
[12] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[13] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[14] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[15] David A. Patterson,et al. Computer Architecture - A Quantitative Approach, 5th Edition , 1996 .
[16] F. Thomson Leighton,et al. ARRAYS AND TREES , 1992 .
[17] Paul T. Bateman,et al. On the size of the coefficients-of the cyclotomic polynomial , 1982 .
[18] V. Benes. Optimal rearrangeable multistage connecting networks , 1964 .
[19] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[20] F. Leighton,et al. Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes , 1991 .
[21] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[22] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[23] David A. Patterson,et al. Computer Architecture, Fifth Edition: A Quantitative Approach , 2011 .
[24] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .