Cited By
View all- Gentry CMitzenmacher M(2009)Fully homomorphic encryption using ideal latticesProceedings of the forty-first annual ACM symposium on Theory of computing10.1145/1536414.1536440(169-178)Online publication date: 31-May-2009
- Kong FYu JQin BLi D(2007)Cryptanalysis of server-aided RSA key generation protocols at MADNES 2005Proceedings of the 4th international conference on Autonomic and Trusted Computing10.5555/2394798.2394808(52-60)Online publication date: 11-Jul-2007
- Dijk MClarke DGassend BSuh GDevadas S(2006)Speeding up Exponentiation using an Untrusted Computational ResourceDesigns, Codes and Cryptography10.1007/s10623-005-3710-839:2(253-273)Online publication date: 1-May-2006
- Show More Cited By