These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
102 related articles for article (PubMed ID: 27658349)
1. A quantum approach to homomorphic encryption. Tan SH; Kettlewell JA; Ouyang Y; Chen L; Fitzsimons JF Sci Rep; 2016 Sep; 6():33467. PubMed ID: 27658349 [TBL] [Abstract][Full Text] [Related]
2. Private predictive analysis on encrypted medical data. Bos JW; Lauter K; Naehrig M J Biomed Inform; 2014 Aug; 50():234-43. PubMed ID: 24835616 [TBL] [Abstract][Full Text] [Related]
3. Experimental Quantum Homomorphic Encryption Using a Quantum Photonic Chip. Li Y; Cao L; Luo W; Zhang H; Cai H; Karim MF; Gao F; Fitzsimons J; Song Q; Liu AQ Phys Rev Lett; 2024 May; 132(20):200801. PubMed ID: 38829067 [TBL] [Abstract][Full Text] [Related]
4. Private queries on encrypted genomic data. Çetin GS; Chen H; Laine K; Lauter K; Rindal P; Xia Y BMC Med Genomics; 2017 Jul; 10(Suppl 2):45. PubMed ID: 28786359 [TBL] [Abstract][Full Text] [Related]
5. Quantum Search on Encrypted Data Based on Quantum Homomorphic Encryption. Zhou Q; Lu S; Cui Y; Li L; Sun J Sci Rep; 2020 Mar; 10(1):5135. PubMed ID: 32198450 [TBL] [Abstract][Full Text] [Related]
6. A New Quantum Private Protocol for Set Intersection Cardinality Based on a Quantum Homomorphic Encryption Scheme for Toffoli Gate. Liu W; Li Y; Wang Z; Li Y Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981404 [TBL] [Abstract][Full Text] [Related]
7. Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms. Hamza R; Hassan A; Ali A; Bashir MB; Alqhtani SM; Tawfeeg TM; Yousif A Entropy (Basel); 2022 Apr; 24(4):. PubMed ID: 35455182 [TBL] [Abstract][Full Text] [Related]
8. A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks. Sun X; Yu FR; Zhang P; Xie W; Peng X Sensors (Basel); 2020 Jul; 20(15):. PubMed ID: 32751627 [TBL] [Abstract][Full Text] [Related]
10. Configurable Encryption and Decryption Architectures for CKKS-Based Homomorphic Encryption. Lee J; Duong PN; Lee H Sensors (Basel); 2023 Aug; 23(17):. PubMed ID: 37687844 [TBL] [Abstract][Full Text] [Related]
11. Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks. Li X; Chen D; Li C; Wang L Sensors (Basel); 2015 Jul; 15(7):15952-73. PubMed ID: 26151208 [TBL] [Abstract][Full Text] [Related]
12. Logistic regression over encrypted data from fully homomorphic encryption. Chen H; Gilad-Bachrach R; Han K; Huang Z; Jalali A; Laine K; Lauter K BMC Med Genomics; 2018 Oct; 11(Suppl 4):81. PubMed ID: 30309350 [TBL] [Abstract][Full Text] [Related]
13. A Full RNS Variant of Approximate Homomorphic Encryption. Cheon JH; Han K; Kim A; Kim M; Song Y Sel Areas Cryptogr; 2018; 11349():347-368. PubMed ID: 33870337 [TBL] [Abstract][Full Text] [Related]
14. Pipelined Key Switching Accelerator Architecture for CKKS-Based Fully Homomorphic Encryption. Duong PN; Lee H Sensors (Basel); 2023 May; 23(10):. PubMed ID: 37430518 [TBL] [Abstract][Full Text] [Related]
15. Applying Deep Neural Networks over Homomorphic Encrypted Medical Data. Vizitiu A; Niƫă CI; Puiu A; Suciu C; Itu LM Comput Math Methods Med; 2020; 2020():3910250. PubMed ID: 32351612 [TBL] [Abstract][Full Text] [Related]
16. An electronic voting scheme based on homomorphic encryption and decentralization. Yuan K; Sang P; Zhang S; Chen X; Yang W; Jia C PeerJ Comput Sci; 2023; 9():e1649. PubMed ID: 38077585 [TBL] [Abstract][Full Text] [Related]
17. Logistic regression model training based on the approximate homomorphic encryption. Kim A; Song Y; Kim M; Lee K; Cheon JH BMC Med Genomics; 2018 Oct; 11(Suppl 4):83. PubMed ID: 30309349 [TBL] [Abstract][Full Text] [Related]
18. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM). Xu K; Liao Y; Qiao L; Liu Z; Yang X PLoS One; 2015; 10(12):e0143975. PubMed ID: 26629817 [TBL] [Abstract][Full Text] [Related]
19. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption. Lu WJ; Yamada Y; Sakuma J BMC Med Inform Decis Mak; 2015; 15 Suppl 5(Suppl 5):S1. PubMed ID: 26732892 [TBL] [Abstract][Full Text] [Related]
20. Secure Outsourced Matrix Computation and Application to Neural Networks. Jiang X; Kim M; Lauter K; Song Y Conf Comput Commun Secur; 2018 Oct; 2018():1209-1222. PubMed ID: 31404438 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]