1. IBM. What will we make of this moment? 2013 IBM Annual Report, 2–13 (2013).
2. Naehrig, M., Lauter, K. & Vaikuntanathan, V. in Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW’11 113–124ACM (2011).
3. Rivest, R., Adleman, L. & Dertouzos, M. in Foundations of Secure Computation Vol. 4 (eds DeMillo, R., Dobkin, D., Jones, A. & Lipton, R.) 169–180 (Academic Press, New York, 1978).
4. Gentry, C. in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC ‘09 169–178ACM (2009).
5. Brakerski, Z. & Vaikuntanathan, V. in Proceedings of the 2011 IEEE 52Nd Annual Symposium on Foundations of Computer Science, FOCS’ 11 97–106IEEE Computer Society (2011).