Author:
Sun Minghao,Wang Shixiong,Chen Hao,Qu Longjiang
Publisher
Springer Science and Business Media LLC
Subject
Information Systems,Computer Science (miscellaneous)
Reference28 articles.
1. Fischlin R and Seifert J P, Tensor-based trapdoors for CVP and their application to public key cryptography, IMA International Conference on Cryptography and Coding, 1999, 1746: 244–257.
2. Hoffstein J, Pipher J, Silverman J H, et al., An Introduction to Mathematical Cryptography, 2nd Edition, Springer, New York, 2014.
3. Regev O, On lattices, learning with errors, random linear codes, and cryptography, Journal of the ACM, 2009, 56(6): 1–40.
4. Brakerski Z and Vaikuntanathan V, Fully homomorphic encryption from ring-lwe and security for key dependent messages, CRYPTO 2011, 2011, 6841: 505–524.
5. Gentry C, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st Annual ACM Symposium on Theory of Computing, New York, 2009.