Security analysis of fully homomorphic encryption systems
Authors: Malinskiy A.E.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-995
Category: Information technology | Chapter: Information Security
Authors: Malinskiy A.E.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-995
Category: Information technology | Chapter: Information Security
Authors: Loktev D.A., Alfimcev A.N.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-996
Category: Information technology
Authors: Matveev V.A., Basarab M.A., Troitskiy I.I.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-997
Category: Information technology | Chapter: Information Security
Authors: Slipenchuk P.V.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-998
Category: Information technology | Chapter: Information Security
Authors: Devyatkov V.V., Myo T.N.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-999
Category: Information technology | Chapter: Computer systems and networks
Authors: Ivanova E.Yu., Lariontseva E.A.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1000
Category: Information technology | Chapter: Information Security
Authors: Bykov A.Yu., Kozhemyakina E.V., Panfilov F.A.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1001
Category: Information technology | Chapter: Computer systems and networks
Authors: Gordeev E.N.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1002
Category: Information technology
Authors: Zakharchuk Iv.I., Zakharchuk Il.I., Veselov Yu.G., Ostrovsky A.S.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1003
Category: Information technology | Chapter: Information Security
Authors: Baskakov I.V., Golovin A.Yu.
Published in issue: #11(23)/2013
DOI: 10.18698/2308-6033-2013-11-1004
Category: Information technology | Chapter: Computer systems and networks