1. Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., and Wernsing, J., “Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy,” Proceedinggs of the 33rd International Conference on Machine Learning, New York, NY, USA, JMLR: W&CP 48.
2. Mishra, P., Lehmkuhl, R., Srinivasan, A., Zhengg, W., and Popa, R. A., “Delphi: A cryptographic inference service for neural networks,”
3. ECMS 2012 Proceedings edited by: K. G. Troitzsch, M. Moehring, U. Lotzmann
4. NEURAL NETWORK BASED CRYPTOGRAPHY
5. Abadi, M. and Andersen, D. G., “Learning to protect communications with adversarial neural networks,” arXiv.