Publisher
Springer Nature Switzerland
Reference17 articles.
1. Lecture Notes in Computer Science;M Chase,2010
2. Costan, V., Devadas, S.: Intel SGX explained. Cryptology ePrint Archive (2016)
3. Falzon, F., Paterson, K.G.: An efficient query recovery attack against a graph encryption scheme. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds.) Computer Security – ESORICS 2022. ESORICS 2022. LNCS, vol. 13554. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17140-6_16
4. Lecture Notes in Computer Science;B Fuhry,2017
5. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)