This post introduces the concept of attestation with Intel SGX enclaves
This post is a first introduction to the basic principles of Confidential Computing.
Fifth part of the series CKKS explained where we see how to define rescaling
Fourth part of the series CKKS explained where we see how to define ciphertext multiplication and relinearization
Third part of the series CKKS explained where we see how to build an HE system from RLWE, implement encryption, decryption, addition and multiplication.
Second part of the series CKKS explained where we see how to implement CKKS encoder and decoder.
First part of the series CKKS explained where we see how to implement a vanilla encoder and decoder.