Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes
暂无分享,去创建一个
[1] Abhishek Banerjee,et al. Pseudorandom Functions and Lattices , 2012, EUROCRYPT.
[2] Sanjeev Arora,et al. New Algorithms for Learning in Presence of Errors , 2011, ICALP.
[3] Stephan Krenn,et al. Learning with Rounding, Revisited: New Reduction, Properties and Applications , 2013, IACR Cryptol. ePrint Arch..
[4] Florian Mendel,et al. Higher-Order Cryptanalysis of LowMC , 2015, ICISC.
[5] Yannick Seurin,et al. How to Encrypt with the LPN Problem , 2008, ICALP.
[6] Guy N. Rothblum,et al. Verifying and decoding in constant depth , 2007, STOC '07.
[7] Arnold Schönhage,et al. Schnelle Multiplikation von Polynomen über Körpern der Charakteristik 2 , 1977, Acta Informatica.
[8] Alon Rosen,et al. Candidate weak pseudorandom functions in AC0 ○ MOD2 , 2014, ITCS.
[9] Chris Peikert,et al. A Toolkit for Ring-LWE Cryptography , 2013, IACR Cryptol. ePrint Arch..
[10] Thomas Johansson,et al. Solving LPN Using Covering Codes , 2014, ASIACRYPT.
[11] Martin R. Albrecht,et al. Ciphers for MPC and FHE , 2015, IACR Cryptol. ePrint Arch..
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Serge Vaudenay,et al. Better Algorithms for LWE and LWR , 2015, EUROCRYPT.
[14] Shai Halevi,et al. Bootstrapping for HElib , 2015, EUROCRYPT.
[15] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2009, JACM.
[16] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[17] Willi Meier,et al. Optimized Interpolation Attacks on LowMC , 2015, ASIACRYPT.
[18] Damien Stehlé,et al. Worst-case to average-case reductions for module lattices , 2014, Designs, Codes and Cryptography.
[19] Aria Shahverdi,et al. Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince , 2014, Financial Cryptography Workshops.
[20] Alexey Pospelov,et al. Faster Polynomial Multiplication via Discrete Fourier Transforms , 2010, CSR.
[21] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[22] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[23] Benny Applebaum,et al. Cryptographic Hardness of Random Local Functions , 2013, computational complexity.
[24] Ruggero Susella,et al. On the Homomorphic Computation of Symmetric Cryptographic Primitives , 2013, IMACC.
[25] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[26] Anne Canteaut,et al. How to Compress Homomorphic Ciphertexts , 2015, IACR Cryptol. ePrint Arch..
[27] Michael Naehrig,et al. A Comparison of the Homomorphic Encryption Schemes FV and YASHE , 2014, AFRICACRYPT.
[28] Jung Hee Cheon,et al. Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.
[29] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[30] J. Faugère,et al. On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations , 2004 .
[31] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[32] Martin R. Albrecht,et al. Algebraic algorithms for LWE problems , 2015, ACCA.
[33] Berk Sunar,et al. Homomorphic AES Evaluation using NTRU , 2014, IACR Cryptol. ePrint Arch..
[34] Shai Halevi,et al. Algorithms in HElib , 2014, CRYPTO.