A. Bouti and J. Keller, Towards Practical Homomorphic Encryption in Cloud Computing, 2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA), pp.67-74, 2015.
DOI : 10.1109/NCCA.2015.20

D. Catalano and D. Fiore, Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1518-1529, 2015.
DOI : 10.1145/2810103.2813624

A. Canteaut, S. Carpov, C. Fontaine, T. Lepoint, M. Naya-plasencia et al., Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, LNCS, vol.71, issue.1, pp.1-21, 2016.
DOI : 10.1007/978-3-662-52993-5_16

URL : https://hal.archives-ouvertes.fr/hal-01401328

S. Carpov, P. Dubrulle, and R. Sirdey, Armadillo, Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC '15, pp.13-19, 2015.
DOI : 10.1145/2732516.2732520

S. Carpov, T. Nguyen, R. Sirdey, G. Constantino, and F. Martinelli, Practical Privacy-Preserving Medical Diagnosis Using Homomorphic Encryption, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), p.2016
DOI : 10.1109/CLOUD.2016.0084

J. Cheon, H. Chung, M. Kim, and K. Lee, Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations, Cryptology ePrint Archive Report, vol.484, 2016.

Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk et al., Privacy-preserving face recognition, PETS'09, LNCS, vol.5672, pp.235-253, 2009.

J. Fan and F. Vercauteren, Somewhat practical fully homomorphic encryption, Cryptology ePrint Archive Report, vol.144, 2012.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178, 2009.
DOI : 10.1145/1536414.1536440

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592

S. Halevi and V. Shoup, Algorithms in HElib, LNCS, vol.8616, issue.14, pp.554-571, 2014.
DOI : 10.1007/978-3-662-44371-2_31

Y. Luo, S. Cheung, and S. Ye, Anonymous Biometric Access Control based on homomorphic encryption, 2009 IEEE International Conference on Multimedia and Expo, pp.1046-1049, 2009.
DOI : 10.1109/ICME.2009.5202677

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.586.7951

P. Méaux, A. Journault, F. Standaert, and C. Carlet, Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts, LNCS, vol.9665, issue.16, pp.311-343, 2016.
DOI : 10.1007/978-3-662-49890-3_13

X. Tan and B. Triggs, Enhanced Local Texture Feature Sets for Face Recognition Under Difficult Lighting Conditions, AMFG 2007, pp.168-182, 2007.
DOI : 10.1007/978-3-540-75690-3_13

URL : https://hal.archives-ouvertes.fr/inria-00548674

M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, SCiFI - A System for Secure Face Identification, 2010 IEEE Symposium on Security and Privacy, pp.239-254, 2010.
DOI : 10.1109/SP.2010.39

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

A. Sadeghi, T. Schneider, and I. Wehrenberg, Efficient privacypreserving face recognition, ICISC'09, LNCS, vol.5984, pp.229-244, 2010.

C. Xiang, C. Tang, Y. Cai, and Q. , Xu Privacy-preserving face recognition with outsourced computation, Soft Computing, p.2015
DOI : 10.1007/s00500-015-1759-5