Fully homomorphic encryption in real world applications
From MaRDI portal
Publication:2188373
Recommendations
- Homomorphic encryption and applications
- Multikey fully homomorphic encryption and applications
- Exploring the Feasibility of Fully Homomorphic Encryption
- Somewhat/fully homomorphic encryption: implementation progresses and challenges
- Fully homomorphic encryption over the integers
- Verifiable Decryption for Fully Homomorphic Encryption
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption
- Fully homomorphic encryption for mathematicians
- Fully homomorphic encryption with relatively small key and ciphertext sizes
Cited in
(7)- Lattice-based public-key cryptography in hardware
- Encrypted SQL arithmetic functions processing for secure cloud database
- Searchable Encryption
- Hedging public-key encryption in the real world
- Protecting privacy through homomorphic encryption. Based on 6 workshops on homomorphic encryption standardization
- Encryption scheduling for remote state estimation under an operation constraint
- Homomorphic encryption and applications
This page was built for publication: Fully homomorphic encryption in real world applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2188373)