02.11.2012 Views

FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD

FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD

FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Realizing Permutation Networks<br />

• Claim: every butterfly level can be realized<br />

by two shifts and two SELECTs<br />

• Example:<br />

0 1 2 3 4 5 6 7<br />

2 1 0 3 6 7 4 5<br />

Control bits: 1 0 1 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!