M. Albrecht, S. Bai, and L. Ducas, A Subfield Lattice Attack on Overstretched NTRU Assumptions, Cryptology ePrint Archive, vol.130, issue.1, 2016.
DOI : 10.1017/S0004972715001288

URL : https://hal.archives-ouvertes.fr/hal-01394211

R. Martin and . Albrecht, On dual lattice attacks against small-secret lwe and parameter choices in helib and seal. Cryptology ePrint Archive, 2017.

M. R. Albrecht, R. Player, and S. Scott, Abstract, Journal of Mathematical Cryptology, vol.9, issue.3, 2015.
DOI : 10.1515/jmc-2015-0016

W. Joppe, K. Bos, J. Lauter, M. Loftus, and . Naehrig, Improved security for a ring-based fully homomorphic encryption scheme, Proc. of Cryptography and Coding: 14th IMA International Conference ? IMACC 2013, pp.45-64, 2013.

Z. Brakerski, Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Advances in Cryptology?CRYPTO 2012, pp.868-886, 2012.
DOI : 10.1007/978-3-642-32009-5_50

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6262

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, (leveled) fully homomorphic encryption without bootstrapping, Proc. of the 3rd Innovations in Theoretical Computer Science Conference ? ITCS 2012, pp.309-325, 2012.
DOI : 10.1145/2633600

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.1531

Z. Brakerski and V. Vaikuntanathan, Lattice-based FHE as secure as PKE, Proceedings of the 5th conference on Innovations in theoretical computer science, ITCS '14
DOI : 10.1145/2554797.2554799

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.7461

I. Chillotti, N. Gama, M. Georgieva, and M. Izabachène, Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds, Advances in Cryptology?ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I 22, pp.3-33, 2016.
DOI : 10.1007/978-3-662-49890-3_31

Y. Doröz and B. Sunar, Flattening ntru for evaluation key free homomorphic encryption, Cryptology ePrint Archive, 2016.

L. Ducas and D. Micciancio, FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.617-640, 2015.
DOI : 10.1007/978-3-662-46800-5_24

J. Fan and F. Vercauteren, Somewhat Practical Fully Homomorphic Encryption, Cryptology ePrint Archive, vol.144, 2012.

C. Gentry, A Fully Homomorphic Encryption Scheme, 2009.

C. Gentry, A. Sahai, and B. Waters, Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
DOI : 10.1007/978-3-642-40041-4_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.9511

S. Halevi and . Helib, Available at https://github.com/shaih

A. Khedr, G. Gulak, and V. Vaikuntanathan, SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, IEEE Transactions on Computers, vol.65, issue.9, 2015.
DOI : 10.1109/TC.2015.2500576

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.689.6476

P. Kirchner and P. Fouque, Comparison between Subfield and Straightforward Attacks on NTRU. Cryptology ePrint Archive, p.717, 2016.

K. Laine, H. Chen, and R. Player, Simple encrypted arithmetic library seal (v2.1), 2016.

T. Lepoint and M. Naehrig, A Comparison of the Homomorphic Encryption Schemes FV and YASHE, Proc. of AFRICACRYPT 2014, pp.318-335, 2014.
DOI : 10.1007/978-3-319-06734-6_20

URL : https://hal.archives-ouvertes.fr/hal-01006484

V. Lyubashevsky, C. Peikert, and O. Regev, On ideal lattices and learning with errors over rings, Advances in Cryptology?EUROCRYPT 2010, pp.1-23, 2010.
DOI : 10.1145/2535925

URL : https://hal.archives-ouvertes.fr/hal-00921792

C. Aguilar-melchor, P. Gaborit, and J. Herranz, Additively homomorphic encryption with d-operand multiplications, Annual Cryptology Conference, pp.138-154, 2010.

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. of Advances in Cryptology ? EUROCRYPT 1999, number 1592 in LNCS, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035

C. Peikert, How (Not) to Instantiate Ring-LWE. Cryptology ePrint Archive, 2016.
DOI : 10.1007/978-3-319-44618-9_22

N. P. Smart and F. Vercauteren, Fully homomorphic simd operations. Designs, Codes and Cryptography, pp.57-81, 2014.
DOI : 10.1007/s10623-012-9720-4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.4088