Return to Article Details
Modes of Operation Suitable for Computing on Encrypted Data
Download
Download PDF