Return to Article Details Modes of Operation Suitable for Computing on Encrypted Data Download Download PDF