Homomorphic Encryption and Some Black Box Attacks
From MaRDI portal
Publication:5039562
DOI10.1007/978-3-030-52200-1_11zbMath1503.94026arXiv1709.01169OpenAlexW3046449215MaRDI QIDQ5039562
Şükrü Yalçınkaya, Alexandre V. Borovik
Publication date: 13 October 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1709.01169
Uses Software
Cites Work
- Black box groups isomorphic to \(\mathrm{PGL}(2,2^e)\).
- Adjoint representations of black box groups \(\operatorname{PSL}_2(\mathbb{F}_q)\)
- Practical homomorphic encryption over the integers for secure computation in the cloud
- New Approaches in Black Box Group Theory
- Implementing Gentry’s Fully-Homomorphic Encryption Scheme
- Algorithms for Black-Box Fields and their Application to Cryptography
- Finding Isomorphisms Between Finite Fields
- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations
- The Complexity of Black-Box Ring Problems
- Fully homomorphic encryption using ideal lattices
This page was built for publication: Homomorphic Encryption and Some Black Box Attacks