{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T07:05:19Z","timestamp":1760598319994,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757563"},{"type":"electronic","value":"9783031757570"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75757-0_14","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"273-293","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7670-830X","authenticated-orcid":false,"given":"Charles","family":"Gouert","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5042-6851","authenticated-orcid":false,"given":"Mehmet","family":"Ugurbil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2601-203X","authenticated-orcid":false,"given":"Dimitris","family":"Mouris","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"de Vega","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5769-0124","authenticated-orcid":false,"given":"Nektarios G.","family":"Tsoutsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Alexander\u00a0Genkin, D.D.L., Madigan, D.: Large-scale Bayesian logistic regression for text categorization. Technometrics 49(3), 291\u2013304 (2007). https:\/\/doi.org\/10.1198\/004017007000000245","key":"14_CR1","DOI":"10.1198\/004017007000000245"},{"doi-asserted-by":"publisher","unstructured":"Becker, A., Ducas, L., Gama, N., Laarhoven, T.: New directions in nearest neighbor searching with applications to lattice sieving. In: Krauthgamer, R. (ed.) 27th SODA, pp. 10\u201324. ACM-SIAM (2016). https:\/\/doi.org\/10.1137\/1.9781611974331.ch2","key":"14_CR2","DOI":"10.1137\/1.9781611974331.ch2"},{"doi-asserted-by":"publisher","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Goldwasser, S. (ed.) ITCS 2012, pp. 309\u2013325. ACM (2012). https:\/\/doi.org\/10.1145\/2090236.2090262","key":"14_CR3","DOI":"10.1145\/2090236.2090262"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/BF02294446","volume":"54","author":"RL Carter","year":"1989","unstructured":"Carter, R.L., Morris, R., Blashfield, R.K.: On the partitioning of squared euclidean distance and its applications in cluster analysis. Psychometrika 54(1), 9\u201323 (1989)","journal-title":"Psychometrika"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-53887-6_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"I Chillotti","year":"2016","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10031, pp. 3\u201333. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53887-6_1"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-319-70694-8_14","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"I Chillotti","year":"2017","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 377\u2013408. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_14"},{"doi-asserted-by":"publisher","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33(1), 34\u201391 (2020). https:\/\/doi.org\/10.1007\/s00145-019-09319-x","key":"14_CR8","DOI":"10.1007\/s00145-019-09319-x"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-78086-9_1","volume-title":"Cyber Security Cryptography and Machine Learning","author":"I Chillotti","year":"2021","unstructured":"Chillotti, I., Joye, M., Paillier, P.: Programmable bootstrapping enables efficient homomorphic inference of deep neural networks. In: Dolev, S., Margalit, O., Pinkas, B., Schwarzmann, A. (eds.) CSCML 2021. LNCS, vol. 12716, pp. 1\u201319. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78086-9_1"},{"unstructured":"Chung, H., Kim, H., Kim, Y.S., Lee, Y.: Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. Cryptology ePrint Archive, Paper 2024\/274 (2024). https:\/\/eprint.iacr.org\/2024\/274","key":"14_CR10"},{"doi-asserted-by":"publisher","unstructured":"Dubey, S.R., Singh, S.K., Chaudhuri, B.B.: Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomput. 503(C), 92\u2013108 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2022.06.111","key":"14_CR11","DOI":"10.1016\/j.neucom.2022.06.111"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-662-46800-5_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"L Ducas","year":"2015","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 617\u2013640. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","key":"14_CR13","DOI":"10.1145\/1536414.1536440"},{"unstructured":"Google Research: Google XLS (2020). https:\/\/google.github.io\/xls","key":"14_CR14"},{"unstructured":"Gorantala, S., et\u00a0al.: A General Purpose Transpiler for Fully Homomorphic Encryption. Cryptology ePrint Archive, Report 2021\/811 (2021). https:\/\/eprint.iacr.org\/2021\/811","key":"14_CR15"},{"doi-asserted-by":"crossref","unstructured":"Gouert, C., Mouris, D., Tsoutsos, N.G.: HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables. Cryptology ePrint Archive, Paper 2023\/1382 (2023). https:\/\/eprint.iacr.org\/2023\/1382","key":"14_CR16","DOI":"10.56553\/popets-2023-0075"},{"doi-asserted-by":"publisher","unstructured":"Gouert, C., Mouris, D., Tsoutsos, N.G.: SoK: new insights into fully homomorphic encryption libraries via standardized benchmarks. PoPETs 2023(3), 154\u2013172 (2023). https:\/\/doi.org\/10.56553\/popets-2023-0075","key":"14_CR17","DOI":"10.56553\/popets-2023-0075"},{"doi-asserted-by":"crossref","unstructured":"Gouert, C., Tsoutsos, N.G.: Romeo: conversion and evaluation of HDL designs in the encrypted domain. In: Proceedings of the 57th ACM\/EDAC\/IEEE Design Automation Conference. DAC 2020, Virtual Event, USA. IEEE Press (2020)","key":"14_CR18","DOI":"10.1109\/DAC18072.2020.9218579"},{"unstructured":"Gouert, C., et\u00a0al.: Accelerated encrypted execution of general-purpose applications. Cryptology ePrint Archive, Report 2023\/641 (2023)","key":"14_CR19"},{"doi-asserted-by":"crossref","unstructured":"Hashemi, S., Anthony, N., Tann, H., Bahar, R.I., Reda, S.: Understanding the impact of precision quantization on the accuracy and energy of neural networks. In: Proceedings of the Conference on Design, Automation & Test in Europe, DATE 2017, pp. 1478\u20131483. European Design and Automation Association, Leuven, BEL (2017)","key":"14_CR20","DOI":"10.23919\/DATE.2017.7927224"},{"doi-asserted-by":"crossref","unstructured":"Horst, A., Hill, A., Gorman, K.: Palmer archipelago penguins data in the palmerpenguins R package - an alternative to Anderson\u2019s irises. R J. 14(1) (2022)","key":"14_CR21","DOI":"10.32614\/RJ-2022-020"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCC.2015.2","volume":"2","author":"NV Juliadotter","year":"2015","unstructured":"Juliadotter, N.V., Choo, K.K.R.: Cloud attack and risk assessment taxonomy. IEEE Cloud Comput. 2(1), 14\u201320 (2015)","journal-title":"IEEE Cloud Comput."},{"issue":"Suppl 7","key":"14_CR23","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1186\/s12920-020-0724-z","volume":"13","author":"M Kim","year":"2020","unstructured":"Kim, M., Song, Y., Li, B., Micciancio, D.: Semi-parallel logistic regression for GWAS on encrypted data. BMC Med. Genomics 13(Suppl 7), 99 (2020)","journal-title":"BMC Med. Genomics"},{"key":"14_CR24","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-031-22966-4_5","volume-title":"ASIACRYPT 2022, Part II","author":"Z Liu","year":"2022","unstructured":"Liu, Z., Micciancio, D., Polyakov, Y.: Large-precision homomorphic sign evaluation using FHEW\/TFHE bootstrapping. In: Agrawal, S., Lin, D. (eds.) ASIACRYPT 2022, Part II. LNCS, vol. 13792, pp. 130\u2013160. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_5"},{"doi-asserted-by":"publisher","unstructured":"Malkauthekar, M.D.: Analysis of euclidean distance and manhattan distance measure in face recognition. In: Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), pp. 503\u2013507. IET, Mumbai (2013). https:\/\/doi.org\/10.1049\/cp.2013.2636","key":"14_CR25","DOI":"10.1049\/cp.2013.2636"},{"unstructured":"Ribeiro, M.I.: Gaussian probability density functions: properties and error characterization. Institute for Systems and Robotics, Lisboa, Portugal (2004)","key":"14_CR26"},{"issue":"9","key":"14_CR27","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TIP.2003.812329","volume":"12","author":"M Unser","year":"2003","unstructured":"Unser, M., Blu, T.: Mathematical properties of the JPEG2000 wavelet filters. IEEE Trans. Image Process. 12(9), 1080\u20131090 (2003)","journal-title":"IEEE Trans. Image Process."},{"doi-asserted-by":"crossref","unstructured":"Van\u00a0Fleet, P.: Discrete Wavelet Transformations: An Elementary Approach with Applications. Wiley, Hoboken (2019). https:\/\/books.google.pt\/books?id=jGAaxQEACAAJ","key":"14_CR28","DOI":"10.1002\/9781119555414"},{"doi-asserted-by":"publisher","unstructured":"Viand, A., Jattke, P., Hithnawi, A.: SoK: fully homomorphic encryption compilers. In: 2021 IEEE Symposium on Security and Privacy, pp. 1092\u20131108. IEEE Computer Society Press (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00068","key":"14_CR29","DOI":"10.1109\/SP40001.2021.00068"},{"unstructured":"Wolf, C.: Yosys Open SYnthesis Suite (2016). https:\/\/yosyshq.net","key":"14_CR30"},{"key":"14_CR31","doi-asserted-by":"publisher","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","volume":"8","author":"P Yang","year":"2020","unstructured":"Yang, P., Xiong, N., Ren, J.: Data security and privacy protection for cloud storage: a survey. IEEE Access 8, 131723\u2013131740 (2020)","journal-title":"IEEE Access"},{"unstructured":"Zama: TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data (2022). https:\/\/github.com\/zama-ai\/tfhe-rs","key":"14_CR32"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75757-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:05:29Z","timestamp":1729595129000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75757-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757563","9783031757570"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75757-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}