Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference55 articles.
1. L. Adam, BoringSSL (2015), https://www.imperialviolet.org/2015/10/17/boringssl.html
2. E. Aharoni, A. Adir, M. Baruch, N. Drucker, G. Ezov, A. Farkash, L. Greenberg, R. Masalha, G. Moshkowich, D. Murik, H. Shaul, O. Soceanu, HeLayers: a tile tensors framework for large neural networks on encrypted data. PoPETs (2023), https://doi.org/10.56553/popets-2023-0020
3. A. Akavia, M. Vald, On the privacy of protocols based on cpa-secure homomorphic encryption. IACR Cryptol. ePrint Arch. 2021, 803 (2021), https://eprint.iacr.org/2021/803
4. S. Arita, S. Nakasato, Fully homomorphic encryption for point numbers, in Chen, K., Lin, D., Yung, M. (eds.) Information Security and Cryptology. pp. 253–270. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-54705-3_16
5. A.A. Badawi, J. Bates, F. Bergamaschi, D.B. Cousins, S. Erabelli, N. Genise, S. Halevi, H. Hunt, A. Kim, Y. Lee, Z. Liu, D. Micciancio, I. Quah, Y. Polyakov, S. Rv, K. Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, V. Zucca, OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive, Paper 2022/915 (2022), https://eprint.iacr.org/2022/915
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Bootstrapping Bits with CKKS;Lecture Notes in Computer Science;2024