(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2012ITCS 2012
Protecting circuits from computationally bounded and noisy leakageSebastian FaustTal Rabinet al.2014SIAM Journal on Computing
(Leveled) fully homomorphic encryption without bootstrappingZvika BrakerskiCraig Gentryet al.2014ACM TOCT