Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
42
views
33
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,009
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Text, Speech and Dialogue
Bootstrapping for Approximate Homomorphic Encryption
other
Author(s):
Jung Hee Cheon
,
Kyoohyung Han
,
Andrey Kim
,
Miran Kim
,
Yongsoo Song
Publication date
(Online):
March 31 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
33
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Fully homomorphic encryption using ideal lattices
Craig Gentry
(2009)
0
comments
Cited
162
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Fully Homomorphic Encryption over the Integers
Marten van Dijk
,
Craig Gentry
,
Shai Halevi
…
(2010)
0
comments
Cited
135
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
(Leveled) fully homomorphic encryption without bootstrapping
Vinod Vaikuntanathan
,
Zvika Brakerski
,
Craig Gentry
(2012)
0
comments
Cited
124
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Kyoohyung Han:
(View ORCID Profile)
Miran Kim:
(View ORCID Profile)
Yongsoo Song:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2018
Publication date (Online):
March 31 2018
Pages
: 360-384
DOI:
10.1007/978-3-319-78381-9_14
SO-VID:
8a25d882-92c0-4e7a-b6d5-1080c5042b47
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Current Advances, Trends and Challenges of Machine Learning and Knowledge Extraction: From Machine Learning to Explainable AI
pp. 12
Prediction of Essential Proteins by Integration of PPI Network Topology and Protein Complexes Information
pp. 24
Fully Secure Cipertext-Policy Hiding CP-ABE
pp. 29
Towards Real-Time Polyp Detection in Colonoscopy Videos: Adapting Still Frame-Based Methodologies for Video Sequences Analysis
pp. 47
Motion-Based Games for Parkinson’s Disease Patients
pp. 49
Virtual PET Images from CT Data Using Deep Convolutional Networks: Initial Results
pp. 54
DroidDelver: An Android Malware Detection System Using Deep Belief Network Based on API Call Blocks
pp. 65
Re-Tellings: The Fourth Layer of Narrative as an Instrument for Critique
pp. 82
Feature Extraction Based on Co-occurrence of Adjacent Local Binary Patterns
pp. 84
Real-Time Segmentation of Non-rigid Surgical Tools Based on Deep Learning and Tracking
pp. 94
Tracking and Retexturing Cloth for Real-Time Virtual Clothing Applications
pp. 133
Privacy-Preserving Federated Brain Tumour Segmentation
pp. 141
Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks
pp. 144
SO(2)-Networks as Neural Oscillators
pp. 168
Joint Optic Disc and Cup Segmentation Using Fully Convolutional and Adversarial Networks
pp. 171
Faster k-Medoids Clustering: Improving the PAM, CLARA, and CLARANS Algorithms
pp. 171
Safeguarding SCADA Systems with Anomaly Detection
pp. 194
What Makes Users Trust a Chatbot for Customer Service? An Exploratory Interview Study
pp. 197
Aspect Level Sentiment Classification with Attention-over-Attention Neural Networks
pp. 199
Real-Time Subject-Dependent EEG-Based Emotion Recognition Algorithm
pp. 226
Linked Data Finland: A 7-star Model and Platform for Publishing and Re-using Linked Datasets
pp. 264
Small-World Optimization Algorithm for Function Optimization
pp. 347
Privacy-Aware Attribute-Based Encryption with User Accountability
pp. 360
Bootstrapping for Approximate Homomorphic Encryption
pp. 399
A Generalized Local Binary Pattern Operator for Multiresolution Gray Scale and Rotation Invariant Texture Classification
pp. 408
Set Similarity Measures for Images Based on Collective Knowledge
pp. 411
Midori: A Block Cipher for Low Energy
pp. 438
A Semantic Comparison of Clustering Algorithms for the Evaluation of Web-Based Similarity Measures
pp. 439
Current State of Czech Text-to-Speech System ARTIC
pp. 518
A Novel Global Convergence Algorithm: Bee Collecting Pollen Algorithm
pp. 711
Design and Analysis of a Bluetooth-Based Indoor Localization System
pp. 728
Static and Dynamic Hand-Gesture Recognition for Augmented Reality Applications
pp. 806
The Imbalanced Training Sample Problem: Under or over Sampling?
Similar content
4,009
Bootstrapping Complete The Look at Pinterest
Authors:
Eileen Li
,
Eric Kim
,
Andrew Zhai
…
Modeling error in experimental assays using the bootstrap principle: understanding discrepancies between assays using different dispensing technologies
Authors:
Sonya M. Hanson
,
Sean Ekins
,
John D. Chodera
QTL analyses of complex traits with cross validation, bootstrapping and other biometric methods
Authors:
A.E. Melchinger
,
H.F. Utz
,
C.C. Schön
See all similar
Cited by
10
Secure large-scale genome-wide association studies using homomorphic encryption
Authors:
Marcelo Blatt
,
Alexander Gusev
,
Yuriy Polyakov
…
Multiparty Homomorphic Encryption from Ring-Learning-with-Errors
Authors:
Christian Mouchet
,
Juan Troncoso-Pastoriza
,
Jean-Philippe Bossuat
…
A Flexible and Privacy-Preserving Collaborative Filtering Scheme in Cloud Computing for VANETs
Authors:
Huijie Yang
,
Jian Shen
,
Tianqi Zhou
…
See all cited by