R. Rivest, A. Shamir and L. Adleman, “A Method of Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126. http://dx.doi.org/10.1145/359340.359342
 M. Van Dijk, C. Gentry and I. Halev, “Fully Homomorphic Encryption over the Integers,” Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptograhic Techniques. Springer-Verlag, Berlin, 2010, pp. 24-43.
 C. Gentry, “Computing Arbitrary Function of Encrypted Data,” Communications of the ACM, Vol. 53, No. 3, 2010, pp. 97-105. http://dx.doi.org/10.1145/1666420.1666444
 N. P. Smart and F. Vercauteren, “Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes,” Proceedings of the 13th International Conference on Practices and Theory in Public Key Cryptography, Springer-Verlag, Berlin, 2010, pp. 420-443.
 D. Stehle and R. Steinfeld, “Faster Fully Homomorphic Encryption,” Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, Springer, Berlin, 2010, pp. 377-394.