共 50 条
- [32] Performance Analysis of Private Information Retrieval Scheme based on Homomorphic Encryption [J]. 2015 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGY AND ACCESSIBILITY (ICTA), 2015,
- [33] A Secure Image Retrieval Method Based on Homomorphic Encryption for Cloud Computing [J]. 2014 19TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2014, : 269 - 274
- [34] Applying Homomorphic Encryption For Securing Cloud Database [J]. 2016 4TH IEEE INTERNATIONAL COLLOQUIUM ON INFORMATION SCIENCE AND TECHNOLOGY (CIST), 2016, : 658 - 664
- [35] Enhanced Database Security Using Homomorphic Encryption [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 377 - 387
- [36] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption [J]. IEICE ELECTRONICS EXPRESS, 2024,
- [38] Reducing the Ciphertext Expansion in Image Homomorphic Encryption via Linear Interpolation Technique [J]. 2015 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2015, : 800 - 804
- [39] High-throughput and fully-pipelined ciphertext multiplier for homomorphic encryption [J]. IEICE ELECTRONICS EXPRESS, 2024, 21 (06): : 1 - 6
- [40] Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 32 - 50