A. Acar, H. Aksu, A. S. Uluagac, and M. Conti. “A Survey on Homomorphic Encryption Schemes: Theory and Implementation”. In: 51.4 (2018). issn: 0360-0300. doi: 10.1145/3214303. |
C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. Gazelle: A Low Latency Framework for Secure Neural Network Inference. 2018. arXiv: 1801.05507 [[cs.CR](http://cs.cr/)]. |
N. Dowlin, R. Gilad-Bachrach, K. Laine, K. Lauter, M. Naehrig, and J. Wernsing. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Tech. rep. MSR-TR-2016-3. 2016. |
IBM. IBM Security Homomorphic Encryption Services. Brochure. 2020. |
R. Lagendijk, Z. Erkin, and M. Barni. “Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation”. In: IEEE Signal Processing Magazine (2013), pp. 82–105. doi: 10.1109/ MSP.2012.2219653. |
L. Rosencrance. Ciphertext. 2020. |
E. Maass. Fully Homomorphic Encryption: Unlocking the Value of Sensitive Data While Preserving Privacy. 2020. |
M. D. Ryan. “Cloud computing security: The scientific challenge, and a survey of solutions”. In: Journal of Systems and Software 86.9 (2013), pp. 2263–2268. issn: 0164-1212. doi: 10.1016/j.jss.2012.12.025. |
D. Huynh. Homomorphic Encryption intro: Part 2: HE landscape and CKKS. 2020. |
D. Huynh. Homomorphic Encryption intro: Part 1: Overview and use cases. 2020. |
R. Yackel. What is homomorphic encryption, and why isn’t it mainstream? 2021. |
A. S. Gillis. Homomorphic Encryption. 2022. |
Optalysys. Encrypted search using fully homomorphic encryption. 2021. |
A. Wood, K. Najarian, and D. Kahrobaei. “Homomorphic encryption for machine learning in medicine and bioinformatics”. In: ACM Computing Surveys (CSUR) 53.4 (2020), pp. 1–35. doi: 10.1145/3394658. |
R. Awadallah and A. Samsudin. “Homomorphic encryption for cloud computing and its challenges”. In: 2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS). IEEE. 2020, pp. 1–6. doi: 10.1109/ ICETAS51660.2020. 9484283. |
S. Yakoubov, V. Gadepally, N. Schear, E. Shen, and A. Yerukhimovich. “A survey of cryptographic approaches to securing big-data analytics in the cloud”. In: 2014 IEEE High Performance Extreme Computing Conference (HPEC). IEEE. 2014, pp. 1–6. doi: 10.1109/HPEC.2014.7040943. |
Chainlink. Homomorphic Encryption. 2023. |
C. Gentry. “Fully homomorphic encryption using ideal lattices”. In: Proceedings of the forty-first annual ACM symposium on Theory of computing. 2009, pp. 169–178. doi: 10.1145/1536414.1536440 |