38
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Advances in Cryptology – CRYPTO 2013 

      How to Run Turing Machines on Encrypted Data

      other

      Read this book at

      Publisher
      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          How to generate and exchange secrets

          Andrew Yao (1986)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            (Leveled) fully homomorphic encryption without bootstrapping

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages

                Bookmark

                Author and book information

                Book Chapter
                2013
                : 536-553
                10.1007/978-3-642-40084-1_30
                60b75fd4-a5c7-4570-8753-d4c29b84de31

                http://www.springer.com/tdm

                History

                Comments

                Comment on this book

                Book chapters

                Similar content3,231

                Cited by21