Protecting circuits from computationally bounded and noisy leakageSebastian FaustTal Rabinet al.2014SIAM Journal on Computing
(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2014ACM TOCT
(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2012ITCS 2012