Computing Arbitrary Functions of Encrypted
Data, by Craig Gentry. Communications of the
ACM, Vol. 53, No.3
Building the Swiss Army Knife, by Boaz Barak
and Zvika Brakerski
HElib (source code)
CryptDB: Processing Queries on an Encrypted
Database, by Raluca Ada Popa, Catherine M.S.
Redfield, Nickolai Zeldovich, and Hari
Balakrishnan
Further reading