Author:
Bhaskar Sourabh,Parmar Keyur,Jinwala Devesh C.
Publisher
Springer Nature Singapore
Reference48 articles.
1. Rivest RL, Adleman L, Dertouzos ML et al (1978) On data banks and privacy homomorphisms. Found Secure Comput 4(11):169–179. https://luca-giuzzi.unibs.it/corsi/Support/papers-cryptography/RAD78.pdf. Accessed 10 Nov 2021
2. Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 1:1–10. https://doi.org/10.5555/2907333.2907524
3. Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv 51(4):1–35. https://doi.org/10.1145/3214303
4. Wood A, Najarian K, Kahrobaei D (2021) Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput Surveys (CSUR) 53(4):1–35. https://doi.org/10.1145/3394658
5. Yao AC (1982) Protocols for secure computations. In: 23rd annual symposium on foundations of computer science. SFCS, IEEE, Chicago, USA, pp 160–164, Nov 1982. https://doi.org/10.1109/SFCS.1982.38