共 14 条
- [1] On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 239 - 258
- [2] Gentry C, 2011, LECT NOTES COMPUT SC, V6632, P129, DOI 10.1007/978-3-642-20465-4_9
- [3] Fully Homomorphic Encryption Using Ideal Lattices [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178
- [5] Gu chunsheng, 2013, Computer Engineering and Applications, V49, P101, DOI 10.3778/j.issn.1002-8331.1201.0401
- [6] [光焱 Guang Yan], 2013, [电子与信息学报, Journal of Electronics & Information Technology], V35, P988
- [7] Hu RY, 2016, ACSR ADV COMPUT, V47, P349
- [8] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
- [9] Smart NP, 2010, LECT NOTES COMPUT SC, V6056, P420
- [10] Stehle D, 2010, LECT NOTES COMPUT SC, V6477, P377, DOI 10.1007/978-3-642-17373-8_22