Academic literature on the topic 'And Fully Homomorphic Encryption Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'And Fully Homomorphic Encryption Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "And Fully Homomorphic Encryption Scheme"
Kumar, V. Satish, and V.Trilik Kumar. "SECURING DATA USING FULLY HOMOMORPHIC ENCRYPTION SCHEMES OVER CLOUD COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 10 (2014): 1157–60. https://doi.org/10.5281/zenodo.14759355.
Full textBai, Shuangjie, Geng Yang, Jingqi Shi, Guoxiu Liu, and Zhaoe Min. "Privacy-Preserving Oriented Floating-Point Number Fully Homomorphic Encryption Scheme." Security and Communication Networks 2018 (July 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/2363928.
Full textJarwal, Abhimanyu, Kamlesh Kumar, and Ajay Kumar. "Secure Data Encryption Scheme for Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 897–902. http://dx.doi.org/10.22214/ijraset.2023.51058.
Full textZhao, Xu, and Zheng Yuan. "Threshold Fully Homomorphic Encryption Scheme Based on NGS of Symmetric Encryption." Symmetry 17, no. 5 (2025): 737. https://doi.org/10.3390/sym17050737.
Full textEL-YAHYAOUI, Ahmed, and Mohamed Dafir ECH-CHERIF EL KETTANI. "A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security." Technologies 7, no. 1 (2019): 21. http://dx.doi.org/10.3390/technologies7010021.
Full textPan, Jingshan, Tongtong Sui, Wen Liu, et al. "Secure Control of Linear Controllers Using Fully Homomorphic Encryption." Applied Sciences 13, no. 24 (2023): 13071. http://dx.doi.org/10.3390/app132413071.
Full textIchibane, Yacine, Youssef Gahi, Mouhcine Guennoun, and Zouhair Guennoun. "Fully Homomorphic Encryption Without Noise." International Journal of Smart Security Technologies 6, no. 2 (2019): 33–51. http://dx.doi.org/10.4018/ijsst.2019070102.
Full textEl-Yahyaoui, Ahmed, and Mohamed Daifr Ech-Cherif El Kettani. "About Fully Homomorphic Encryption Improvement Techniques." International Journal of Embedded and Real-Time Communication Systems 10, no. 3 (2019): 1–20. http://dx.doi.org/10.4018/ijertcs.2019070101.
Full textShen, Jiachen, Yekang Zhao, Shitao Huang, and Yongjun Ren. "Secure and Flexible Privacy-Preserving Federated Learning Based on Multi-Key Fully Homomorphic Encryption." Electronics 13, no. 22 (2024): 4478. http://dx.doi.org/10.3390/electronics13224478.
Full textMahmood, Zainab H., and Mahmood K. Ibrahem. "HARDWARE IMPLEMENTATION OF AN ENCRYPTION FOR ENHANCEMENT DGHV." Iraqi Journal of Information & Communications Technology 2, no. 2 (2019): 44–57. http://dx.doi.org/10.31987/ijict.2.2.69.
Full textDissertations / Theses on the topic "And Fully Homomorphic Encryption Scheme"
Klungre, Vidar. "The Smart-Vercauteren Fully Homomorphic Encryption Scheme." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for matematiske fag, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18696.
Full textDong, Jiyang. "Accelerating BGV Scheme of Fully Homomorphic Encryption Using GPUs." Digital WPI, 2016. https://digitalcommons.wpi.edu/etd-theses/1233.
Full textVial, prado Francisco. "Contributions to design and analysis of Fully Homomorphic Encryption schemes." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLV107/document.
Full textCostache, Anamaria. "On the practicality of ring-based fully homomorphic encryption schemes." Thesis, University of Bristol, 2018. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.743059.
Full textLi, Zhizhou. "Multi-Scheme Fully Homomorphic Encryptions And Its Application In Privacy Preserving Data Mining." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1430760068.
Full textFauzi, Prastudy. "On Fully Homomorphic Encryption." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18992.
Full textKing, Kevin C. "Optimizing fully homomorphic encryption." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113156.
Full textAlperin-Sheriff, Jacob. "Towards practical fully homomorphic encryption." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53951.
Full textCetin, Gizem S. "Applications of Fully Homomorphic Encryption." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-dissertations/526.
Full textFranzoni, Alice. "Fully Homomorphic Encryption e Possibili Applicazioni." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13568/.
Full textBooks on the topic "And Fully Homomorphic Encryption Scheme"
Chatterjee, Ayantika, and Khin Mi Mi Aung. Fully Homomorphic Encryption in Real World Applications. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6393-1.
Full textAgrawal, Rashmi, and Ajay Joshi. On Architecting Fully Homomorphic Encryption-based Computing Systems. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-31754-5.
Full textChatterjee, Ayantika, and Khin Mi Mi Aung. Fully Homomorphic Encryption in Real World Applications. Springer, 2019.
Find full textChatterjee, Ayantika, and Khin Mi Mi Aung. Fully Homomorphic Encryption in Real World Applications. Springer, 2020.
Find full textBook chapters on the topic "And Fully Homomorphic Encryption Scheme"
Zheng, Zhiyong, Kun Tian, and Fengxia Liu. "Fully Homomorphic Encryption." In Financial Mathematics and Fintech. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-7644-5_6.
Full textGentry, Craig, and Shai Halevi. "Implementing Gentry’s Fully-Homomorphic Encryption Scheme." In Advances in Cryptology – EUROCRYPT 2011. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20465-4_9.
Full textHuang, Ruwei, Zhikun Li, and Jianan Zhao. "A Verifiable Fully Homomorphic Encryption Scheme." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24907-6_31.
Full textNuida, Koji. "Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_8.
Full textLi, Mengtian, and Bin Hu. "A New Fully Homomorphic Encryption Scheme on Batch Technique." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00006-6_14.
Full textScholl, Peter, and Nigel P. Smart. "Improved Key Generation for Gentry’s Fully Homomorphic Encryption Scheme." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_2.
Full textUpadhyay, Rohitkumar R., and Sahadeo Padhye. "Multi-Key Fully Homomorphic Encryption Scheme Over the Integers." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9811-1_16.
Full textDu, Gang, Chunguang Ma, Zengpeng Li, and Ding Wang. "Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme." In Cloud Computing and Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68542-7_21.
Full textYousuf, Hana, Michael Lahzi, Said A. Salloum, and Khaled Shaalan. "Systematic Review on Fully Homomorphic Encryption Scheme and Its Application." In Studies in Systems, Decision and Control. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-47411-9_29.
Full textBos, Joppe W., Kristin Lauter, Jake Loftus, and Michael Naehrig. "Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme." In Cryptography and Coding. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45239-0_4.
Full textConference papers on the topic "And Fully Homomorphic Encryption Scheme"
Zhang, Kaiyuan, Antian Wang, Keshab K. Parhi, and Yingjie Lao. "Hardware Acceleration for Fully Homomorphic Encryption Scheme Switching from CKKS to FHEW." In 2024 58th Asilomar Conference on Signals, Systems, and Computers. IEEE, 2024. https://doi.org/10.1109/ieeeconf60004.2024.10942749.
Full textLu, Sijia, Wenping Zhu, Bohan Yang, et al. "17.2 A 28nm 4.05µJ/Encryption 8.72kHMul/s Reconfigurable Multi-Scheme Fully Homomorphic Encryption Processor for Encrypted Client-Server Computing." In 2025 IEEE International Solid-State Circuits Conference (ISSCC). IEEE, 2025. https://doi.org/10.1109/isscc49661.2025.10904812.
Full textZhou, Jinzhong, Rui Jiang, Gangyong Chen, and Lile Wang. "Homomorphic Encryption Based Full Flow Privacy Protection Scheme for Federated Learning." In 2024 7th International Conference on Computer Information Science and Application Technology (CISAT). IEEE, 2024. http://dx.doi.org/10.1109/cisat62382.2024.10695226.
Full textQi, Zhenghua, Gang Yang, Xunyi Ren, and Qiang Zhou. "Compressible Identity-Based Fully Homomorphic Encryption." In 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS). IEEE, 2024. https://doi.org/10.1109/icbctis64495.2024.00013.
Full textLee, Kang Hoon, YoungBae Jeon, and Ji Won Yoon. "Faster Homomorphic DFT and Speech Analysis for Torus Fully Homomorphic Encryption." In 2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P). IEEE, 2024. http://dx.doi.org/10.1109/eurosp60621.2024.00033.
Full textSanon, Sogo Pierre, Ilir Ademi, Michael Zentara, and Hans Dieter Schotten. "Applicability of Fully Homomorphic Encryption in Mobile Communication." In 2024 3rd International Conference on 6G Networking (6GNet). IEEE, 2024. https://doi.org/10.1109/6gnet63182.2024.10765741.
Full textZhou, Minxuan, Yujin Nam, Xuan Wang, et al. "UFC: A Unified Accelerator for Fully Homomorphic Encryption." In 2024 57th IEEE/ACM International Symposium on Microarchitecture (MICRO). IEEE, 2024. https://doi.org/10.1109/micro61859.2024.00034.
Full textYoussouf, Adoum, Abdramane Issa, and Daouda Ahmat. "Privacy-Preserving Secret Sharing using Fully Homomorphic Encryption." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012048.
Full textDakhare, Bhawana S., and Lata L. Ragha. "CKKS Homomorphic Encryption Scheme for Financial Dataset." In 2025 IEEE 14th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2025. https://doi.org/10.1109/csnt64827.2025.10968654.
Full textJin, Fangyuan, Yanqin Zhu, and Xizhao Luo. "Verifiable Fully Homomorphic Encryption scheme." In 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet). IEEE, 2012. http://dx.doi.org/10.1109/cecnet.2012.6202046.
Full text