A Subfield Lattice Attack on Overstretched NTRU Assumptions, Cryptology ePrint Archive, vol.130, issue.1, 2016. ,
DOI : 10.1017/S0004972715001288
URL : https://hal.archives-ouvertes.fr/hal-01394211
On dual lattice attacks against small-secret lwe and parameter choices in helib and seal. Cryptology ePrint Archive, 2017. ,
Abstract, Journal of Mathematical Cryptology, vol.9, issue.3, 2015. ,
DOI : 10.1515/jmc-2015-0016
Improved security for a ring-based fully homomorphic encryption scheme, Proc. of Cryptography and Coding: 14th IMA International Conference ? IMACC 2013, pp.45-64, 2013. ,
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP, Advances in Cryptology?CRYPTO 2012, pp.868-886, 2012. ,
DOI : 10.1007/978-3-642-32009-5_50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.6262
(leveled) fully homomorphic encryption without bootstrapping, Proc. of the 3rd Innovations in Theoretical Computer Science Conference ? ITCS 2012, pp.309-325, 2012. ,
DOI : 10.1145/2633600
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.1531
Lattice-based FHE as secure as PKE, Proceedings of the 5th conference on Innovations in theoretical computer science, ITCS '14 ,
DOI : 10.1145/2554797.2554799
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.380.7461
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds, Advances in Cryptology?ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security Proceedings, Part I 22, pp.3-33, 2016. ,
DOI : 10.1007/978-3-662-49890-3_31
Flattening ntru for evaluation key free homomorphic encryption, Cryptology ePrint Archive, 2016. ,
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.617-640, 2015. ,
DOI : 10.1007/978-3-662-46800-5_24
Somewhat Practical Fully Homomorphic Encryption, Cryptology ePrint Archive, vol.144, 2012. ,
A Fully Homomorphic Encryption Scheme, 2009. ,
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based ,
DOI : 10.1007/978-3-642-40041-4_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.9511
Available at https://github.com/shaih ,
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers, IEEE Transactions on Computers, vol.65, issue.9, 2015. ,
DOI : 10.1109/TC.2015.2500576
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.689.6476
Comparison between Subfield and Straightforward Attacks on NTRU. Cryptology ePrint Archive, p.717, 2016. ,
Simple encrypted arithmetic library seal (v2.1), 2016. ,
A Comparison of the Homomorphic Encryption Schemes FV and YASHE, Proc. of AFRICACRYPT 2014, pp.318-335, 2014. ,
DOI : 10.1007/978-3-319-06734-6_20
URL : https://hal.archives-ouvertes.fr/hal-01006484
On ideal lattices and learning with errors over rings, Advances in Cryptology?EUROCRYPT 2010, pp.1-23, 2010. ,
DOI : 10.1145/2535925
URL : https://hal.archives-ouvertes.fr/hal-00921792
Additively homomorphic encryption with d-operand multiplications, Annual Cryptology Conference, pp.138-154, 2010. ,
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. of Advances in Cryptology ? EUROCRYPT 1999, number 1592 in LNCS, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035
How (Not) to Instantiate Ring-LWE. Cryptology ePrint Archive, 2016. ,
DOI : 10.1007/978-3-319-44618-9_22
Fully homomorphic simd operations. Designs, Codes and Cryptography, pp.57-81, 2014. ,
DOI : 10.1007/s10623-012-9720-4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.4088