Pages that link to "Item:Q3003380"
From MaRDI portal
The following pages link to Implementing Gentry’s Fully-Homomorphic Encryption Scheme (Q3003380):
Displaying 42 items.
- (Leveled) Fully Homomorphic Encryption without Bootstrapping (Q92720) (← links)
- Polly cracker, revisited (Q285245) (← links)
- Homomorphic AES evaluation using the modified LTV scheme (Q310240) (← links)
- LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme (Q498985) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Efficient privacy-preserving protocol for \(k\)-NN search over encrypted data in location-based service (Q680776) (← links)
- Cryptanalysis of a homomorphic encryption scheme (Q680918) (← links)
- Security and privacy aspects in MapReduce on clouds: a survey (Q739007) (← links)
- Secret computation of purchase history data using somewhat homomorphic encryption (Q890595) (← links)
- Bootstrapping for approximate homomorphic encryption (Q1648805) (← links)
- CRT-based fully homomorphic encryption over the integers (Q1749613) (← links)
- Security analysis of cryptosystems using short generators over ideal lattices (Q1756730) (← links)
- On the deductive security of queries to databases with multi-bit records (Q1789206) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- Short principal ideal problem in multicubic fields (Q2023319) (← links)
- Flattening NTRU for evaluation key free homomorphic encryption (Q2191204) (← links)
- Differentially private naive Bayes learning over multiple data sources (Q2195313) (← links)
- EPiC: efficient privacy-preserving counting for MapReduce (Q2218469) (← links)
- Homomorphically encrypted \(k\)-means on cloud-hosted servers with low client-side load (Q2218487) (← links)
- Some security bounds for the key sizes of DGHV scheme (Q2254535) (← links)
- On the deductive security of queries to confidential databases in cloud computing systems (Q2364247) (← links)
- Fully homomorphic SIMD operations (Q2439746) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- Bootstrapping for helib (Q2661696) (← links)
- Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs (Q2687034) (← links)
- Bootstrapping for BGV and BFV revisited (Q2697680) (← links)
- A novel fully homomorphic encryption scheme bsed on LWE (Q2825264) (← links)
- On CCA-Secure Somewhat Homomorphic Encryption (Q2889863) (← links)
- Depth Optimized Efficient Homomorphic Sorting (Q2946441) (← links)
- FHEW with Efficient Multibit Bootstrapping (Q2946444) (← links)
- On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes (Q2946478) (← links)
- Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes (Q2947538) (← links)
- Cryptanalysis of a Homomorphic Encryption Scheme Over Integers (Q2980858) (← links)
- Secure Outsourced Computation (Q3011899) (← links)
- The Geometry of Lattice Cryptography (Q3092183) (← links)
- Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme (Q3104682) (← links)
- On Constructing Homomorphic Encryption Schemes from Coding Theory (Q3104683) (← links)
- Blending FHE-NTRU Keys – The Excalibur Property (Q3179473) (← links)
- Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption (Q3194623) (← links)
- Privacy-preserving set-based estimation using partially homomorphic encryption (Q6099919) (← links)
- Fast norm computation in smooth-degree abelian number fields (Q6142769) (← links)
- Threshold secret sharing with geometric algebras (Q6496087) (← links)