Author:
Alabdulatif Abdulatif,Khalil Ibrahim,Kumarage Heshan,Zomaya Albert Y.,Yi Xun
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science,Software
Reference39 articles.
1. Security in cloud computing: Opportunities and challenges;Ali;Inf. Sci.,2015
2. (leveled) fully homomorphic encryption without bootstrapping;Brakerski;TOCT,2014
3. Z. Brakerski, V. Vaikuntanathan, Fully homomorphic encryption from ring-lwe and security for key dependent messages, in: Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings, 2011, pp. 505–524. http://dx.doi.org/10.1007/978-3-642-22792-9_29.
4. Z. Brakerski, V. Vaikuntanathan, Efficient fully homomorphic encryption from (standard) LWE, in: IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, Palm Springs, CA, USA, October 22-25, 2011, 2011, pp. 97–106. http://dx.doi.org/10.1109/FOCS.2011.12.
5. H. Chen, K. Laine, R. Player, Simple encrypted arithmetic library - SEAL v2.1, IACR Cryptology ePrint Archive 2017 (2017) 224. http://eprint.iacr.org/2017/224.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献