[1]
D. Rotaru, N. P. Smart, and M. Stam, “Modes of Operation Suitable for Computing on Encrypted Data”, ToSC, vol. 2017, no. 3, pp. 294–324, Sep. 2017, doi: 10.13154/tosc.v2017.i3.294-324.