Recommendation for key management In: NIST Special Publication 800-57 Part 1 Rev, p.NIST, 2016. ,
Private Database Queries Using Somewhat Homomorphic Encryption, International Conference on Applied Cryptography and Network Security, pp.102-118, 2013. ,
DOI : 10.1007/978-3-642-38980-1_7
(Leveled) fully homomorphic encryption without bootstrapping, ACM Transactions on Computation Theory, vol.6, issue.3, p.13, 2014. ,
DOI : 10.1145/2090236.2090262
URL : http://people.csail.mit.edu/vinodv/6892-Fall2013/BGV.pdf
Search-and-Compute on Encrypted Data, International Conference on Financial Cryptography and Data Security, pp.142-159, 2015. ,
DOI : 10.1007/978-3-662-48051-9_11
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data, IEEE Transactions on Information Forensics and Security, vol.11, issue.1, pp.188-199, 2016. ,
DOI : 10.1109/TIFS.2015.2483486
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009. ,
DOI : 10.1145/1536414.1536440
Better security for queries on encrypted databases, IACR Cryptology ePrint Archive, p.470, 2016. ,
On the Efficiency of FHE-based Private Queries, IEEE Transactions on Dependable and Secure Computing, vol.99, pp.1-1, 2016. ,
DOI : 10.1109/TDSC.2016.2568182
Can homomorphic encryption be practical?, ACM Workshop on Cloud Computing Security Workshop, CCSW 2011, pp.113-124, 2011. ,
On data banks and privacy homomorphism . Foundations of Secure Computation, pp.169-177, 1978. ,
Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption, 2016 3rd Asia-Pacific World Congress on Computer Science and Engineering (APWC on CSE), pp.1-9, 2016. ,
DOI : 10.1109/APWC-on-CSE.2016.013
Private Conjunctive Query over Encrypted Data, Progress in Cryptology -AFRICACRYPT 2017, pp.149-164, 2017. ,
DOI : 10.1007/978-3-662-49890-3_6
Practical Packing Method in Somewhat Homomorphic Encryption, p.2013 ,
DOI : 10.1007/978-3-642-54568-9_3