[1]
“Modes of Operation Suitable for Computing on Encrypted Data”, ToSC, vol. 2017, no. 3, pp. 294–324, Sep. 2017, doi: 10.13154/tosc.v2017.i3.294-324.