1. A survey of secure computation using trusted execution environments;Li,2023
2. Path ORAM: an extremely simple oblivious RAM protocol;Stefanov;Journal of the ACM (JACM),2018
3. Software protection and simulation on oblivious RAMs
4. Fully homomorphic encryption using ideal lattices;Gentry
5. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes;Pascal;Public-Key Cryptosystems Based on Composite Degree Residuosity Classes,1999