Trusted computing with addition machines. I
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A method for obtaining digital signatures and public-key cryptosystems
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Addition Machines
- Efficient fully homomorphic encryption from (standard) LWE
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption over the integers
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption and secure comparison
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- gold-MUSIC: A Variation on MUSIC to Accurately Determine Peaks of the Spectrum
Cited in
(5)
This page was built for publication: Trusted computing with addition machines. I
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q681716)