-
1
-
-
70350342511
-
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
-
Halevi, S. (ed.) Springer, Heidelberg
-
Applebaum, B., Cash, D., Peikert, C., Sahai, A.: Fast cryptographic primitives and circular-secure encryption based on hard learning problems. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 595-618. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 595-618
-
-
Applebaum, B.1
Cash, D.2
Peikert, C.3
Sahai, A.4
-
2
-
-
84893425406
-
Improved security for a ring-based fully homomorphic encryption scheme
-
(full version)
-
Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme (full version). Cryptology ePrint Archive, Report 2013/075 (2013), http://eprint.iacr.org/
-
(2013)
Cryptology EPrint Archive Report 2013/075
-
-
Bos, J.W.1
Lauter, K.2
Loftus, J.3
Naehrig, M.4
-
3
-
-
84865507640
-
Fully homomorphic encryption without modulus switching from classical gapSVP
-
Safavi-Naini, R., Canetti, R. (eds.) Springer, Heidelberg
-
Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical gapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868-886. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 868-886
-
-
Brakerski, Z.1
-
4
-
-
84856466374
-
Fully homomorphic encryption without bootstrapping
-
Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: ITCS, pp. 309-325 (2012)
-
(2012)
ITCS
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
5
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: FOCS, pp. 97-106 (2011)
-
(2011)
FOCS
, pp. 97-106
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
6
-
-
80051986706
-
Fully homomorphic encryption from ring-LWE and security for key dependent messages
-
Rogaway, P. (ed.) Springer, Heidelberg
-
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505-524. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 505-524
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
7
-
-
82955184568
-
BKZ 2.0: Better lattice security estimates
-
Lee, D.H., Wang, X. (eds.) Springer, Heidelberg
-
Chen, Y., Nguyen, P.Q.: BKZ 2.0: Better lattice security estimates. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 1-20. Springer, Heidelberg (2011)
-
(2011)
ASIACRYPT 2011. LNCS
, vol.7073
, pp. 1-20
-
-
Chen, Y.1
Nguyen, P.Q.2
-
8
-
-
84883356524
-
Batch fully homomorphic encryption over the integers
-
Johansson, T., Nguyen, P.Q. (eds.) Springer, Heidelberg
-
Cheon, J.H., Coron, J.-S., Kim, J., Lee, M.S., Lepoint, T., Tibouchi, M., Yun, A.: Batch fully homomorphic encryption over the integers. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 315-335. Springer, Heidelberg (2013)
-
(2013)
EUROCRYPT 2013. LNCS
, vol.7881
, pp. 315-335
-
-
Cheon, J.H.1
Coron, J.-S.2
Kim, J.3
Lee, M.S.4
Lepoint, T.5
Tibouchi, M.6
Yun, A.7
-
10
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169-178 (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
11
-
-
79957974657
-
Implementing Gentry's fully-homomorphic encryption scheme
-
Paterson, K.G. (ed.) Springer, Heidelberg
-
Gentry, C., Halevi, S.: Implementing Gentry's fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129-148. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
12
-
-
84865518868
-
Homomorphic evaluation of the AES circuit
-
Safavi-Naini, R., Canetti, R. (eds.) Springer, Heidelberg
-
Gentry, C., Halevi, S., Smart, N.P.: Homomorphic evaluation of the AES circuit. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 850-867. Springer, Heidelberg (2012)
-
(2012)
CRYPTO 2012. LNCS
, vol.7417
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.P.3
-
13
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Buhler, J.P. (ed.) Springer, Heidelberg
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
-
(1998)
ANTS 1998. LNCS
, vol.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
14
-
-
80955157888
-
Can homomorphic encryption be practical
-
Cachin, C., Ristenpart, T. (eds.) ACM
-
Lauter, K., Naehrig, M., Vaikuntanathan, V.: Can homomorphic encryption be practical. In: Cachin, C., Ristenpart, T. (eds.) CCSW, pp. 113-124. ACM (2011)
-
(2011)
CCSW
, pp. 113-124
-
-
Lauter, K.1
Naehrig, M.2
Vaikuntanathan, V.3
-
15
-
-
79951793525
-
Better key sizes (and attacks) for LWE-based encryption
-
Kiayias, A. (ed.) Springer, Heidelberg
-
Lindner, R., Peikert, C.: Better key sizes (and attacks) for LWE-based encryption. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 319-339. Springer, Heidelberg (2011)
-
(2011)
CT-RSA 2011. LNCS
, vol.6558
, pp. 319-339
-
-
Lindner, R.1
Peikert, C.2
-
16
-
-
84862629748
-
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
-
opez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC, pp. 1219-1234 (2012)
-
(2012)
STOC
, pp. 1219-1234
-
-
Opez-Alta1
Tromere2
Vaikuntanathan, V.3
-
17
-
-
77954639468
-
On ideal lattices and learning with errors over rings
-
Gilbert, H. (ed.) Springer, Heidelberg
-
Lyubashevsky, V., Peikert, C., Regev, O.: On ideal lattices and learning with errors over rings. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 1-23. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
18
-
-
17744363914
-
Worst-case to average-case reductions based on Gaussian measures
-
IEEE Computer Society
-
Micciancio, D., Regev, O.:Worst-case to average-case reductions based on Gaussian measures. In: SIAM J. on Comp., pp. 372-381. IEEE Computer Society (2004)
-
(2004)
SIAM J. on Comp.
, pp. 372-381
-
-
Micciancio, D.1
Regev, O.2
-
19
-
-
70350294927
-
Lattice-based cryptography
-
Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Springer, Heidelberg
-
Micciancio, D., Regev, O.: Lattice-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 147-191. Springer, Heidelberg (2009)
-
(2009)
Post-Quantum Cryptography
, pp. 147-191
-
-
Micciancio, D.1
Regev, O.2
-
20
-
-
80051993169
-
Fully homomorphic encryption over the integers with shorter public keys
-
Rogaway, P. (ed.) Springer, Heidelberg
-
Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully homomorphic encryption over the integers with shorter public keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487-504. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 487-504
-
-
Coron, J.-S.1
Mandal, A.2
Naccache, D.3
Tibouchi, M.4
-
21
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press, New-York
-
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, vol. 4, pp. 169-180. Academic Press, New-York (1978)
-
(1978)
Foundations of Secure Computation
, vol.4
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
22
-
-
0023532388
-
A hierarchy of polynomial time lattice basis reduction algorithms
-
Schnorr, C.-P.: A hierarchy of polynomial time lattice basis reduction algorithms. Theor. Comput. Sci. 53, 201-224 (1987)
-
(1987)
Theor. Comput. Sci.
, vol.53
, pp. 201-224
-
-
Schnorr, C.-P.1
-
24
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Nguyen, P.Q., Pointcheval, D. (eds.) Springer, Heidelberg
-
Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420-443. Springer, Heidelberg (2010)
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
25
-
-
79958014767
-
Making ntru as secure as worst-case problems over ideal lattices
-
Paterson, K.G. (ed.) Springer, Heidelberg
-
Stehe, D., Steinfeld, R.: Making NTRU as secure as worst-case problems over ideal lattices. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 27-47. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 27-47
-
-
Stehe, D.1
Steinfeld, R.2
-
26
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Gilbert, H. (ed.) Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
|