Ayantika Chatterjee
Introduction.- Mathematical Background.- Searching and Sorting on Encrypted Data.- Translating Algorithms to Handle Fully Homomorphic Encrypted Data.- Secure Database Handling.- Encrypted Processor Design.- Conclusion.