-
2
-
-
33745571012
-
On lattices, learning with errors, random linear codes and cryptography
-
O. Regev, "On Lattices, Learning With Errors, Random Linear Codes And Cryptography", ACM Symposium On Theory of Computing, pp. 84-93, 2005.
-
(2005)
ACM Symposium on Theory of Computing
, pp. 84-93
-
-
Regev, O.1
-
3
-
-
38049064946
-
Practical and secure solutions for integer comparison
-
J. Garay, B. Schoenmakers and J. Villegas, "Practical and Secure Solutions For Integer Comparison", Public Key Cryptography, Lecture Notes in Computer Science, pp. 330-342, 2007.
-
(2007)
Public Key Cryptography, Lecture Notes in Computer Science
, pp. 330-342
-
-
Garay, J.1
Schoenmakers, B.2
Villegas, J.3
-
4
-
-
44449128937
-
Predicting lattice reduction
-
N. Gama and P. Q. Nguyen, "Predicting Lattice Reduction", Advances in Cryptology, Eurocrypt 2010, Lecture Notes in Computer Science, pp. 31-51, 2008.
-
(2008)
Advances in Cryptology, Eurocrypt 2010, Lecture Notes in Computer Science
, pp. 31-51
-
-
Gama, N.1
Nguyen, P.Q.2
-
6
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully Homomorphic Encryption Using Ideal Lattices", ACM Symposium On Theory of Computing, pp. 169-178, 2009.
-
(2009)
ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
7
-
-
70350642078
-
Public-key cryptosystems from the worst-case shortest vector problem: Extended abstract
-
C. Peikert, "Public-key Cryptosystems From The Worst-Case Shortest Vector Problem: Extended Abstract", ACM Symposium On Theory of Computing, pp. 333-342, 2009.
-
(2009)
ACM Symposium on Theory of Computing
, pp. 333-342
-
-
Peikert, C.1
-
8
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan, "Fully Homomorphic Encryption Over The Integers", Advances in Cryptology, Eurocrypt 2010, Lecture Notes in Computer Science, pp. 24-43, 2010.
-
(2010)
Advances in Cryptology, Eurocrypt 2010, Lecture Notes in Computer Science
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
9
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry, "Computing Arbitrary Functions Of Encrypted Data", Communications Of The ACM, pp. 97-105, 2010.
-
(2010)
Communications of the ACM
, pp. 97-105
-
-
Gentry, C.1
-
10
-
-
77954639468
-
On ideal lattices and learning with errors over rings
-
V. Lyubashevsky, C. Peikert and O. Regev, "On Ideal Lattices And Learning With Errors Over Rings", Eurocrypt, Lecture Notes in Computer Science, pp. 1-23, 2010.
-
(2010)
Eurocrypt, Lecture Notes in Computer Science
, pp. 1-23
-
-
Lyubashevsky, V.1
Peikert, C.2
Regev, O.3
-
14
-
-
79957974657
-
Implementing gentry's fully-homomorphic encryption scheme
-
C. Gentry and S. Halevi, "Implementing Gentry's Fully-Homomorphic Encryption Scheme", Advances in Cryptology, EuroCrypt 2011, Lecture Notes in Computer Science, pp. 129-148, 2011.
-
(2011)
Advances in Cryptology, EuroCrypt 2011, Lecture Notes in Computer Science
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
16
-
-
84865518868
-
Homomorphic evaluation of the AES circuit
-
C. Gentry, S. Halevi and N. Smart, "Homomorphic Evaluation Of The AES Circuit", Advances in Cryptology, Crypto 2012, Lecture Notes in Computer Science, pp. 850-867, 2012.
-
(2012)
Advances in Cryptology, Crypto 2012, Lecture Notes in Computer Science
, pp. 850-867
-
-
Gentry, C.1
Halevi, S.2
Smart, N.3
-
18
-
-
84876012553
-
ML confidential: Machine learning on encrypted data
-
T. Graepel, K. Lauter and M. Naehrig, "ML Confidential: Machine Learning on Encrypted Data", Information Security and Cryptology, Lecture Notes in Computer Science, pp. 1-21, 2013.
-
(2013)
Information Security and Cryptology, Lecture Notes in Computer Science
, pp. 1-21
-
-
Graepel, T.1
Lauter, K.2
Naehrig, M.3
|