TY - STD TI - Personal Genome Project. [http://www.personalgenomes.org/] UR - http://www.personalgenomes.org/ ID - ref1 ER - TY - STD TI - HapMap Project. [http://hapmap.ncbi.nlm.nih.gov/] UR - http://hapmap.ncbi.nlm.nih.gov/ ID - ref2 ER - TY - CHAP AU - Humbert, M. AU - Ayday, E. AU - Hubaux, J. -. P. AU - Telenti, A. PY - 2013 DA - 2013// TI - Addressing the concerns of the lacks family: quantification of kin genomic privacy BT - Proceedings of the ACM SIGSAC Conference on Computer and Communications Security ID - Humbert2013 ER - TY - JOUR AU - Erlich, Y. AU - Narayanan, A. PY - 2014 DA - 2014// TI - Routes for breaching and protecting genetic privacy JO - Nature Reviews Genetics VL - 15 UR - https://doi.org/10.1038/nrg3723 DO - 10.1038/nrg3723 ID - Erlich2014 ER - TY - STD TI - Naveed M, Ayday E, Clayton EW, Fellay J, Gunter CA, Hubaux J-P, Malin BA, Wang X: Privacy in the Genomic Era. arXiv,abs/1405.1891v3 ID - ref5 ER - TY - JOUR AU - Kantarcioglu, M. AU - Jiang, W. AU - Liu, Y. AU - Malin, B. PY - 2008 DA - 2008// TI - A cryptographic approach to securely share and query genomic sequences JO - IEEE Trans on Inf Technol Biomed VL - 12 UR - https://doi.org/10.1109/TITB.2007.908465 DO - 10.1109/TITB.2007.908465 ID - Kantarcioglu2008 ER - TY - CHAP AU - Baldi, P. AU - Baronio, R. AU - Cristofaro, E. D. PY - 2011 DA - 2011// TI - Countering GATTACA: efficient and secure testing of fully-sequenced human genomes BT - Proceedings of the 18th ACM Conference on Computer and Communications Security ID - Baldi2011 ER - TY - CHAP AU - Ayday, E. AU - Raisaro, J. L. AU - McLaren, P. J. AU - Fellay, J. AU - Hubaux, J. -. P. PY - 2013 DA - 2013// TI - Privacy-preserving Computation of Disease Risk by Using Genomic, Clinical, and Environmental Data BT - USENIX Workshop on Health Information Technologies ID - Ayday2013 ER - TY - CHAP AU - Gentry, C. PY - 2009 DA - 2009// TI - Fully homomorphic encryption using ideal lattices BT - Proceedings of the 40th ACM Symposium on Theory of Computing ID - Gentry2009 ER - TY - JOUR AU - van Dijk, M. AU - Gentry, C. AU - Halevi, S. AU - Vaikuntanathan, V. PY - 2010 DA - 2010// TI - Fully homomorphic encryption over the integers JO - Proceedings of Advances in Cryptology-Eurocrypt VL - 6110 ID - van Dijk2010 ER - TY - JOUR AU - Gentry, C. AU - Sahai, A. AU - Waters, B. PY - 2013 DA - 2013// TI - Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based JO - Proceedings of Advances in Cryptology-Crypto VL - 8042 ID - Gentry2013 ER - TY - CHAP AU - Yasuda, M. AU - Shimoyama, T. AU - Kogure, J. AU - Yokoyama, K. AU - Koshiba, T. PY - 2013 DA - 2013// TI - Secure pattern matching using somewhat homomorphic encryption BT - Proceedings of the ID - Yasuda2013 ER - TY - CHAP AU - Lauter, K. AU - Naehrig, M. AU - Vaikuntanathan, V. PY - 2011 DA - 2011// TI - Can homomorphic encryption be practical? BT - Proceedings of the 18th ACM Conference on Cloud Computing Security ID - Lauter2011 ER - TY - JOUR AU - Graepel, T. AU - Lauter, K. AU - Naehrig, M. PY - 2012 DA - 2012// TI - Ml confidential: Machine learning on encrypted data JO - Proceedings of Information Security and Cryptology-ICISC VL - 7839 ID - Graepel2012 ER - TY - JOUR AU - Bos, J. W. AU - Lauter, K. AU - Naehrig, M. PY - 2014 DA - 2014// TI - Private predictive analysis on encrypted medical data JO - Journal of Biomedical Informatics VL - 50 UR - https://doi.org/10.1016/j.jbi.2014.04.003 DO - 10.1016/j.jbi.2014.04.003 ID - Bos2014 ER - TY - JOUR AU - Lauter, K. AU - López-Alt, A. AU - Naehrig, M. PY - 2014 DA - 2014// TI - Private computation on encrypted genomic data JO - Proceedings of Progress in Cryptology - LATINCRYPT VL - 8895 ID - Lauter2014 ER - TY - CHAP AU - Cheon, J. H. AU - Kim, M. AU - Lauter, K. ED - Brenner, M. ED - Christin, N. ED - Johnson, B. ED - Rohloff, K. PY - 2015 DA - 2015// TI - Homomorphic computation of edit distance BT - Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC UR - https://doi.org/10.1007/978-3-662-48051-9_15 DO - 10.1007/978-3-662-48051-9_15 ID - Cheon2015 ER - TY - JOUR AU - Gentry, C. AU - Halevi, S. AU - Smart, N. PY - 2012 DA - 2012// TI - Homomorphic evaluation of the AES circuit JO - Proceedings of Advances in Cryptology-Crypto VL - 7417 ID - Gentry2012 ER - TY - JOUR AU - Bos, J. W. AU - Lauter, K. AU - Loftus, J. AU - Naehrig, M. PY - 2013 DA - 2013// TI - Improved security for a ring-based fully homomorphic encryption scheme JO - Proceedings of Cryptography and Coding - 14th IMA International Conference VL - 8308 ID - Bos2013 ER - TY - JOUR AU - Wagner, R. A. AU - Fischer, M. J. PY - 1974 DA - 1974// TI - The string to string correction problem JO - Journal of the ACM VL - 21 UR - https://doi.org/10.1145/321796.321811 DO - 10.1145/321796.321811 ID - Wagner1974 ER - TY - CHAP AU - Brakerski, Z. AU - Gentry, C. AU - Vaikuntanathan, V. PY - 2012 DA - 2012// TI - (Leveled) fully homomorphic encryption without bootstrapping BT - Proceedings of the 3rd Innovations in Theoretical Computer Science Conference ID - Brakerski2012 ER - TY - JOUR AU - Brakerski, Z. PY - 2012 DA - 2012// TI - Fully homomorphic encryption without modulus swithing from classical gapsvp JO - Proceedings of Advances in Cryptology-Crypto VL - 7417 ID - Brakerski2012 ER - TY - JOUR AU - Lyubashevsky, V. AU - Peikert, C. AU - Regev, O. PY - 2010 DA - 2010// TI - On ideal lattices and learning with errors over rings JO - Proceedings of Advances in Cryptology-Eurocrypt VL - 6110 ID - Lyubashevsky2010 ER - TY - JOUR AU - Smart, N. AU - Vercauteren, F. PY - 2014 DA - 2014// TI - Fully homomorphic SIMD operations JO - Designs, Codes and Cryptography VL - 71 UR - https://doi.org/10.1007/s10623-012-9720-4 DO - 10.1007/s10623-012-9720-4 ID - Smart2014 ER - TY - JOUR AU - Stehlé, D. AU - Steinfeld, R. PY - 2011 DA - 2011// TI - Making NTRU as secure as worst-case problems over ideal lattices JO - Proceedings of Advances in Cryptology - EUROCRYPT VL - 6632 ID - Stehlé2011 ER - TY - CHAP AU - López-Alt, A. AU - Tromer, E. AU - Vaikuntanathan, V. PY - 2012 DA - 2012// TI - On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption BT - Proceedings of the 40th ACM Symposium on Theory of Computing ID - López-Alt2012 ER - TY - CHAP AU - Cheon, J. H. AU - Kim, M. AU - Kim, M. ED - Brenner, M. ED - Christin, N. ED - Johnson, B. ED - Rohloff, K. PY - 2015 DA - 2015// TI - Search-and-compute on encrypted data BT - Proceedings of Financial Cryptography and Data Security - FC International Workshop WAHC UR - https://doi.org/10.1007/978-3-662-48051-9_11 DO - 10.1007/978-3-662-48051-9_11 ID - Cheon2015 ER - TY - CHAP AU - Halevi, S. AU - Shoup, V. PY - 2013 DA - 2013// TI - Design and implementation of a homomorphic encryption library BT - Technical report, IBM ID - Halevi2013 ER - TY - STD TI - Shoup V: NTL: A Library for Doing Number Theory. [http://www.shoup.net/ntl] UR - http://www.shoup.net/ntl ID - ref29 ER - TY - STD TI - Bluestein LI: A Linear Filtering Approach to the Computation of Discrete Fourier Transform. IEEE Transactions on Audio and Electroacoustics. 18 (4): 451-455. ID - ref30 ER - TY - JOUR AU - Nussbaumer, H. J. PY - 1980 DA - 1980// TI - Fast polynomial transform algorithms for digital convolution JO - IEEE Trans on Acoustics, Speech and Signal Proceesing VL - 28 UR - https://doi.org/10.1109/TASSP.1980.1163372 DO - 10.1109/TASSP.1980.1163372 ID - Nussbaumer1980 ER - TY - JOUR AU - Lindner, R. AU - Peikert, C. PY - 2011 DA - 2011// TI - Better key sizes (and attacks) for lwe-based encryption JO - Proceedings of Topics in Cryptology-CT-RSA VL - 6558 ID - Lindner2011 ER - TY - JOUR AU - Lepoint, T. AU - Naehrig, M. PY - 2014 DA - 2014// TI - A comparison of the homomorphic encryption schemes fv and yashe JO - Proceedings of Progress in Cryptology-AFRICACRYPT VL - 8469 ID - Lepoint2014 ER -