{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:07:16Z","timestamp":1769857636330,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032155405","type":"print"},{"value":"9783032155412","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-15541-2_7","type":"book-chapter","created":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:50Z","timestamp":1769803670000},"page":"117-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimized FPGA Architecture for Modular Reduction in NTT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7665-5324","authenticated-orcid":false,"given":"Tolun","family":"Tosun","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3314-3980","authenticated-orcid":false,"given":"Selim","family":"K\u0131rb\u0131y\u0131k","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3438-7954","authenticated-orcid":false,"given":"Emre","family":"Ko\u00e7er","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8318-4081","authenticated-orcid":false,"given":"Ersin","family":"Alaybeyo\u011flu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,31]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1515\/jmc-2015-0016","volume":"9","author":"MR Albrecht","year":"2015","unstructured":"Albrecht, M.R., Player, R., Scott, S.: On the concrete hardness of learning with errors. J. Math. Crypt. 9(3), 169\u2013203 (2015)","journal-title":"J. Math. Crypt."},{"key":"7_CR2","doi-asserted-by":"publisher","unstructured":"Ayduman, C., Ko\u00e7er, E., K\u0131rb\u0131y\u0131k, S., Can\u00a0Mert, A., Sava\u015f, E.: Efficient design-time flexible hardware architecture for accelerating homomorphic encryption. In: 2023 IFIP\/IEEE 31st International Conference on Very Large Scale Integration (VLSI-SoC), October 2023, pp. 1\u20137 (2023). https:\/\/doi.org\/10.1109\/VLSI-SoC57769.2023.10321943","DOI":"10.1109\/VLSI-SoC57769.2023.10321943"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/3-540-47721-7_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"P Barrett","year":"1987","unstructured":"Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311\u2013323. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_24"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bisheh-Niasar, M., Azarderakhsh, R., Mozaffari-Kermani, M.: High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography. In: 2021 IEEE 28th Symposium on Computer Arithmetic (ARITH), pp. 94\u2013101. IEEE (2021)","DOI":"10.1109\/ARITH51176.2021.00028"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Z Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical GapSVP. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 868\u2013886. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_50"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00145-019-09319","volume":"33","author":"I Chilotti","year":"2019","unstructured":"Chilotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: TFHE: fast fully homomorphic encryption over the torus. J. Cryptol. 33, 34\u201391 (2019). https:\/\/doi.org\/10.1007\/s00145-019-09319","journal-title":"J. Cryptol."},{"issue":"90","key":"7_CR7","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1090\/S0025-5718-1965-0178586-1","volume":"19","author":"JW Cooley","year":"1965","unstructured":"Cooley, J.W., Tukey, J.W.: An algorithm for the machine calculation of complex Fourier series. Math. Comput. 19(90), 297\u2013301 (1965)","journal-title":"Math. Comput."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"72498","DOI":"10.1109\/ACCESS.2023.3295245","volume":"11","author":"S Di Matteo","year":"2023","unstructured":"Di Matteo, S., Gerfo, M.L., Saponara, S.: VLSI design and FPGA implementation of an NTT hardware accelerator for homomorphic seal-embedded library. IEEE Access 11, 72498\u201372508 (2023)","journal-title":"IEEE Access"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"de\u00a0Dinechin, F., Pasca, B.: Large multipliers with fewer DSP blocks. In: 2009 International Conference on Field Programmable Logic and Applications, pp. 250\u2013255. IEEE (2009)","DOI":"10.1109\/FPL.2009.5272296"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/TCSI.2022.3225208","volume":"70","author":"P Duong-Ngoc","year":"2022","unstructured":"Duong-Ngoc, P., Kwon, S., Yoo, D., Lee, H.: Area-efficient number theoretic transform architecture for homomorphic encryption. IEEE Trans. Circ. Syst. I Regul. Pap. 70(3), 1270\u20131283 (2022)","journal-title":"IEEE Trans. Circ. Syst. I Regul. Pap."},{"key":"7_CR11","unstructured":"Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Geng, Y., Hu, X., Wang, Z.: GS-MDC: High-speed and area-efficient number theoretic transform design. IEEE Trans. Circ. Syst. II Exp. Briefs 71(12), 4974\u20134978 (2024)","DOI":"10.1109\/TCSII.2024.3430954"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Gentleman, W.M., Sande, G.: Fast Fourier transforms: for fun and profit. In: Proceedings of the November 7\u201310, 1966, Fall Joint Computer Conference, pp. 563\u2013578 (1966)","DOI":"10.1145\/1464291.1464352"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"issue":"10","key":"7_CR16","first-page":"3942","volume":"70","author":"S Kurniawan","year":"2023","unstructured":"Kurniawan, S., Duong-Ngoc, P., Lee, H.: Configurable memory-based NTT architecture for homomorphic encryption. IEEE Trans. Circ. Syst. II Exp. Briefs 70(10), 3942\u20133946 (2023)","journal-title":"IEEE Trans. Circ. Syst. II Exp. Briefs"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Liu, S.H., Kuo, C.Y., Mo, Y.N., Su, T.: An area-efficient, conflict-free, and configurable architecture for accelerating NTT\/INTT. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 32(3), 519\u2013529 (2023)","DOI":"10.1109\/TVLSI.2023.3336951"},{"key":"7_CR18","doi-asserted-by":"publisher","first-page":"52911","DOI":"10.1109\/ACCESS.2024.3386977","volume":"12","author":"R Mareta","year":"2024","unstructured":"Mareta, R., Satriawan, A., Duong, P.N., Lee, H.: A bootstrapping-capable configurable NTT architecture for fully homomorphic encryption. IEEE Access 12, 52911\u201352921 (2024)","journal-title":"IEEE Access"},{"issue":"11","key":"7_CR19","doi-asserted-by":"publisher","first-page":"2829","DOI":"10.1109\/TC.2020.3017930","volume":"71","author":"AC Mert","year":"2020","unstructured":"Mert, A.C., Karabulut, E., \u00d6zt\u00fcrk, E., Sava\u015f, E., Aysu, A.: An extensive study of flexible design methods for the number theoretic transform. IEEE Trans. Comput. 71(11), 2829\u20132843 (2020)","journal-title":"IEEE Trans. Comput."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Mert, A.C., \u00d6zt\u00fcrk, E., Sava\u015f, E.: Design and implementation of encryption\/decryption architectures for BFV homomorphic encryption scheme. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 28(2), 353\u2013362 (2019)","DOI":"10.1109\/TVLSI.2019.2943127"},{"issue":"170","key":"7_CR21","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comput."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Mu, J., et al.: Scalable and conflict-free NTT hardware accelerator design: methodology, proof and implementation. IEEE Trans. Comput. Aided Des. Integr. Circ. Syst. 42(5), 1504\u20131517 (2022)","DOI":"10.1109\/TCAD.2022.3205552"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen, D.N., et al.: HyperNTT: a fast and accurate NTT\/INTT accelerator with multi-level pipelining and an improved K2-RED module. In: 2024 International Technical Conference on Circuits\/Systems, Computers, and Communications (ITC-CSCC), pp. 1\u20136. IEEE (2024)","DOI":"10.1109\/ITC-CSCC62988.2024.10628429"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Nguyen, T.T., Kim, J., Lee, H.: CKKS-based homomorphic encryption architecture using parallel NTT multiplier. In: 2023 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1\u20134. IEEE (2023)","DOI":"10.1109\/ISCAS46773.2023.10181714"},{"issue":"7","key":"7_CR25","doi-asserted-by":"publisher","first-page":"2669","DOI":"10.1109\/TCSI.2022.3166550","volume":"69","author":"R Paludo","year":"2022","unstructured":"Paludo, R., Sousa, L.: NTT architecture for a Linux-ready RISC-V fully-homomorphic encryption accelerator. IEEE Trans. Circ. Syst. I Regul. Pap. 69(7), 2669\u20132682 (2022)","journal-title":"IEEE Trans. Circ. Syst. I Regul. Pap."},{"issue":"3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"1506","DOI":"10.1109\/TETC.2021.3073475","volume":"9","author":"T Plantard","year":"2021","unstructured":"Plantard, T.: Efficient word size modular arithmetic. IEEE Trans. Emerg. Top. Comput. 9(3), 1506\u20131518 (2021). https:\/\/doi.org\/10.1109\/TETC.2021.3073475","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"10","key":"7_CR27","first-page":"4068","volume":"69","author":"Z Ye","year":"2022","unstructured":"Ye, Z., Cheung, R.C., Huang, K.: PipeNTT: a pipelined number theoretic transform architecture. IEEE Trans. Circ. Syst. II Exp. Briefs 69(10), 4068\u20134072 (2022)","journal-title":"IEEE Trans. Circ. Syst. II Exp. Briefs"}],"container-title":["Lecture Notes in Computer Science","Lightweight Cryptography for Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-15541-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T20:07:52Z","timestamp":1769803672000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-15541-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032155405","9783032155412"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-15541-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"31 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LightSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Lightweight Cryptography for Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"lightsec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.encrypt-on.com\/activities\/conferences\/lightsec-2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}