1 A. Costache, "Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?" 9610 : 325-340, 2016
2 K. Eisentrager., "Weak Instance of PLWE" 8781 : 183-194, 2014
3 Y. Doröz., "Toward Practical Homomorphic Evaluation of Block Ciphers using Prince" 8438 : 208-220, 2014
4 J. Fan., "Somewhat Practical Fully Homomorphic Encryption" IACR Cryptol. ePrint Arch 2015
5 P. S. Pisa., "Somewhat Homomorphic Encryption Scheme for Arithmetic Operation" 2012
6 M. Yasuda., "Secure Statistical Analysis Using R-LWE Based Homomorphic Encryption" 9144 : 471-487, 2015
7 R. Hall., "Secure Multiple Linear Regression Based on Homomorphic Encryption" 27 (27): 669-691, 2011
8 J. Coron., "Scale-Invariant Fully Homomorphic Encryption over the Integers" 8383 : 311-328, 2014
9 Y. Elias., "Provably Weak Instances of Ring-LWE" 9215 : 63-92, 2015
10 J. Bos., "Private Predictive Analysis on Encrypted Medical Data" 50 : 234-343, 2014
1 A. Costache, "Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?" 9610 : 325-340, 2016
2 K. Eisentrager., "Weak Instance of PLWE" 8781 : 183-194, 2014
3 Y. Doröz., "Toward Practical Homomorphic Evaluation of Block Ciphers using Prince" 8438 : 208-220, 2014
4 J. Fan., "Somewhat Practical Fully Homomorphic Encryption" IACR Cryptol. ePrint Arch 2015
5 P. S. Pisa., "Somewhat Homomorphic Encryption Scheme for Arithmetic Operation" 2012
6 M. Yasuda., "Secure Statistical Analysis Using R-LWE Based Homomorphic Encryption" 9144 : 471-487, 2015
7 R. Hall., "Secure Multiple Linear Regression Based on Homomorphic Encryption" 27 (27): 669-691, 2011
8 J. Coron., "Scale-Invariant Fully Homomorphic Encryption over the Integers" 8383 : 311-328, 2014
9 Y. Elias., "Provably Weak Instances of Ring-LWE" 9215 : 63-92, 2015
10 J. Bos., "Private Predictive Analysis on Encrypted Medical Data" 50 : 234-343, 2014
11 201M. Kim., "Private Genome Analysis Through Homomorphic Encryption" 1-15, 2015
12 D. Boneh., "Private Database Queries Using Somewhat Homomorphic Encryption" 7954 : 102-118, 2013
13 K. Lauter., "Private Computation on Encrypted Genomic Data" 8895 : 3-27, 2015
14 D. Liu, "Practical fully homomorphic encryption without noise reduction" IACR Cryptol. ePrint Arch 2015
15 M. Yasuda., "Practical Packing Method in Somewhat Homomorphic Encryption" 8247 : 34-50, 2014
16 Z. Brakerski., "Packed Ciphertexts in LWE-based Homomorphic Encryption" 7778 : 1-13, 2013
17 V. Lyubashevsky., "On Ideal Lattices and Learning with Errors over Rings" 6110 : 1-23, 2010
18 Y. Wang, "Octonion Algebra and Noise-Free Fully Homomorphic Encryption(FHE)Schemes"
19 J. Li., "Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings" IACR Cryptol. ePrint Arch. 2015
20 M. Yasuda., "New Packing Method in Somewhat Homomorphic Encryption and Its Applications" 8 (8): 2194-2213, 2015
21 N. Dowlin., "Manual for Using Homomorphic Encryption for BioInformatics" Microsoft 1-16, 2015
22 D. Stehle., "Making NTRU as Secure as Worst-case Problems over Ideal Lattices" 6632 : 27-47, 2011
23 M. Chenal., "Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes" 9290 : 397-418, 2015
24 C. Gentry., "Implementing Gentry’s Fully-Homomorphic Encryption Scheme" 6632 : 129-148, 2011
25 C. Gentry., "Homomorphic Encryption from Learning with Errors : Conceptually-simpler, Asymptotically-faster, Attribute-based" 8042 : 72-92, 2013
26 Y. Doroz., "Homomorphic AES Evaluation using NTRU"
27 M. Yagisawa, "Fully homomorphic encryption without bootstrapping" IACR Cryptol. ePrint Arch 2015
28 M. Yagisawa, "Fully homomorphic encryption on octonion ring" IACR Cryptol. ePrint Arch 2015
29 N. P. Smart., "Fully Homomorphic SIMD Operations" 71 (71): 57-81, 2014
30 M. Yagisawa, "Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem" IACR Cryptol. ePrint Arch. 2016
31 M. Dijk., "Fully Homomorphic Encryption over the Integers" 6110 : 24-43, 2010
32 Y. Ramaiah., "Efficient Public Key Homomorphic Encryption Over Integer Plaintexts" 123-128, 2012
33 H. Zhou., "Efficient Homomorphic Encryption on Integer Vectors and Its Applications" 1-9, 2014
34 N. Downlin., "CryptoNets : Applying Neural Networks to Encrypted Data with High Throughput and Accuracy" 2016
35 K. Nuida, "Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise" IACR Cryptol. ePrint Arch 2015
36 H. Chen., "Attacks on Search-RLWE" IACR Cryptol. ePrint Arch 2015
37 H. T. Lee., "Analysis of Gong et al. ’ s CCA2-Secure Homomorphic Encryption" IACR Cryptol. ePrint Arch 2016
38 D. B. Cousins., "An FPGA Co-Processor Implementation of Homomorphic Encryption" 9-11, 2014
39 Y. Hu., "An Attack on a Fully Homomorphic Encryption Scheme" IACR Cryptol. ePrint Arch 2012
40 R. Dahab., "Adaptive Key Recovery Attacks on NTRU-based Somewhat Homomorphic Encryption Schemes" 9063 : 283-296, 2015
41 Y. Doroz., "Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware" 9293 : 185-204, 2015
42 T. Poppelmann., "Accelerating Homomorphic Evaluation on Reconfigurable Hardware" IACR Cryptol. ePrint Arch 2015
43 X. Cao., "Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction" Cryptology ePrint Archive 2013
44 Y. Doroz., "Accelerating Fully Homomorphic Encryption in Hardware" 64 (64): 1509-1521, 2016
45 K. Rohloff., "A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU" 8438 : 221-234, 2014
46 Z. Chen., "A Regev-Type Fully Homomorphic Encryption Scheme Using Modulus Switching" 2014 : 2014
47 Y. Ding., "A Novel Fully Homomorphic Encryption Based on LWE" 21 (21): 84-92, 2016
48 Z.Chen, "A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE" IACR Cryptol. ePrint Arch. 2015
49 E. Morais., "A Key Recovery Attack to the Scale-Invariant NTRU-based Somewhat Homomorphic Encryption Scheme" IACR Cryptol. ePrint Arch 2014
50 L. Gong., "A Homomorphic Encryption Scheme with Adaptive Chosen Ciphertext Security But Without Random Oracle" 609 : 253-261, 2016
51 T. Lepoint., "A Comparison of the Homomorphic Encryption Schemes FV and YASHE" 8469 : 318-335, 2014
52 K. Nuida., "(Batch)Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces" 9056 : 537-555, 2015