2019
DOI: 10.1007/978-3-030-17982-3_9
|View full text |Cite
|
Sign up to set email alerts
|

Logarithm Design on Encrypted Data with Bitwise Operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…For the sake of the flow of this study, we suggest the readers to refer to [19,23,24] for a more insightful understanding of the above operations as well as other homomorphic operations given in Table 1. e Algorithm 1 illustrates the whole process of the training in plaintext, where lines (7-10) and lines (12,15,16) are the feedforward and the backpropagation algorithms, respectively.…”
Section: Multiplicationmentioning
confidence: 99%
“…For the sake of the flow of this study, we suggest the readers to refer to [19,23,24] for a more insightful understanding of the above operations as well as other homomorphic operations given in Table 1. e Algorithm 1 illustrates the whole process of the training in plaintext, where lines (7-10) and lines (12,15,16) are the feedforward and the backpropagation algorithms, respectively.…”
Section: Multiplicationmentioning
confidence: 99%