(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2014ACM TOCTPaper
Protecting circuits from computationally bounded and noisy leakageSebastian FaustTal Rabinet al.2014SIAM Journal on ComputingPaper
(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2012ITCS 2012Conference paper