A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303. |
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020. |
M. D. Ryan. “Cloud computing security: The scientific challenge, and a survey of solutions”. In: Journal of Systems and Software 86.9 (2013), pp. 2263–2268. issn: 0164-1212. doi: 10.1016/ j.jss.2012.12.025. |
C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. Gazelle: A Low Latency Framework for Secure Neural Network Inference. 2018. arXiv: 1801.05507 [[cs.CR](http://cs.cr/)]. |
A. S. Gillis. Homomorphic Encryption. 2022. (visited on 05/23/2023). |
R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021. (visited on 05/23/2023). |
R. Awadallah and A. Samsudin. “Homomorphic encryption for cloud computing and its challenges”. In: 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE. 2020, pp. 1–6. doi: 10.1109/ICETAS51660.2020.9484283. |
Chainlink. Homomorphic Encryption. 2023. |
J. Contreras. Homomorphic encryption with SEAL. |
Homomorphic Encryption Standardization. Introduction. |
K. El Makkaoui, A. Ezzati, and A. B. Hssane. “Challenges of using homomorphic encryption to secure cloud computing”. In: 2015 International Conference on Cloud Technologies and Applications (CloudTech). IEEE. 2015, pp. 1–7. doi:10.1109/CloudTech. 2015.7337011. |