This post introduces the concept of attestation with Intel SGX enclaves

This post is a first introduction to the basic principles of Confidential Computing.

Fifth part of the series CKKS explained where we see how to define rescaling

Fourth part of the series CKKS explained where we see how to define ciphertext multiplication and relinearization

Third part of the series CKKS explained where we see how to build an HE system from RLWE, implement encryption, decryption, addition and multiplication.

Second part of the series CKKS explained where we see how to implement CKKS encoder and decoder.

First part of the series CKKS explained where we see how to implement a vanilla encoder and decoder.