[1]
Rotaru, D. et al. 2017. Modes of Operation Suitable for Computing on Encrypted Data. IACR Transactions on Symmetric Cryptology. 2017, 3 (Sep. 2017), 294–324. DOI:https://doi.org/10.13154/tosc.v2017.i3.294-324.