1. E. Bagdasaryan and V. Shmatikov, "Blind backdoors in deep learning models," in Usenix Security, 2021.
2. Flexible and Efficient Verifiable Computation on Encrypted Data
3. (Leveled) Fully Homomorphic Encryption without Bootstrapping
4. B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell, "Bulletproofs: Short proofs for confidential transactions and more," in IEEE Symposium on Security and Privacy (S&P). IEEE, 2018, pp. 315--334.