22.04.2014 Views

a590003

a590003

a590003

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.0 Appendix<br />

Please see Attachment 1 – Publications (PROCEED AHEAD Final Report Full Papers<br />

Attachment 1 Mar 2013.pdf) for the following publications:<br />

1. Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits<br />

2. Fully Homomorphic Encryption without Bootstrapping<br />

3. Targeted Malleability: Homomorphic Encryption for Restricted Computations<br />

4. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller<br />

5. Homomorphic Evaluation of the AES Circuit<br />

6. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP<br />

7. When Homomorphism Becomes a Liability<br />

8. Quantum-Secure Message Authentication Codes<br />

9. Dynamic Proofs of Retrievability via Oblivious RAM<br />

10. Hardness of SIS and LWE with Small Parameters<br />

11. How to Delegate Secure Multiparty Computation to the Cloud<br />

12. An Equational Approach to Secure Multi-party Computation<br />

13. Semantic Security for the Wiretap Channel<br />

14. Multi-Instance Security and its Application to Password-Based Cryptography<br />

15. To Hash or Not to Hash Again (In)differentiability Results for H 2 and HMAC<br />

16. FHE Library - Design and Implementation of a Homomorphic-Encryption Library<br />

17. Using Homomorphic Encryption for Large Scale Statistical Analysis<br />

Approved for Public Release; Distribution Unlimited.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!