Cryptanalysis of a homomorphic encryption scheme
From MaRDI portal
(Redirected from Publication:680918)
Recommendations
- Cryptanalysis of chosen symmetric homomorphic schemes
- Cryptanalysis of a homomorphic encryption scheme over integers
- Comparison-based attacks against noise-free fully homomorphic encryption schemes
- On the CCA-1 security of somewhat homomorphic encryption over the integers
- CRT-based fully homomorphic encryption over the integers
Cites work
- scientific article; zbMATH DE number 4035724 (Why is no real title available?)
- scientific article; zbMATH DE number 6322171 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A Framework for Efficient and Composable Oblivious Transfer
- Advances in cryptology -- EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15--19, 2012. Proceedings
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
- Fully homomorphic SIMD operations
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption over the integers with shorter public keys
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption with polylog overhead
- Fully homomorphic encryption with relatively small key and ciphertext sizes
- Implementing Gentry's fully-homomorphic encryption scheme
- Packed ciphertexts in LWE-based homomorphic encryption
- Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
Cited in
(15)- Analysis of the security of generic homomorphic authenticated encryption
- Security analysis of modified Rivest scheme
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
- Cryptanalysis of a homomorphic encryption scheme over integers
- scientific article; zbMATH DE number 5005276 (Why is no real title available?)
- Security Analysis of the Strong Diffie-Hellman Problem
- Cryptanalysis of a computer cryptography scheme based on a filter bank
- Cryptanalysis on an access control in a hierarchy
- Cryptanalysis of an Extension of the Hill Cipher
- Cryptanalysis of elliptic curve hidden number problem from PKC 2017
- Counter-Cryptanalysis
- Cryptanalysis of the Convex Hull Click Human Identification Protocol
- Analysis of Gong et al.'s CCA2-secure homomorphic encryption
- Ontology-based semantic annotation for problem set archives in the Web
- A complete break of an homomorphic encryption algorithm based on polynomial rings
This page was built for publication: Cryptanalysis of a homomorphic encryption scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q680918)