[1]
D. Rotaru, N. P. Smart, and M. Stam, “Modes of Operation Suitable for Computing on Encrypted Data”, ToSC, vol. 2017, no. 3, pp. 294–324, Sep. 2017.