{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:48:14Z","timestamp":1725904094056},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319619811"},{"type":"electronic","value":"9783319619828"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61982-8_9","type":"book-chapter","created":{"date-parts":[[2017,7,13]],"date-time":"2017-07-13T05:22:20Z","timestamp":1499923340000},"page":"75-88","source":"Crossref","is-referenced-by-count":1,"title":["HPC on the Intel Xeon Phi: Homomorphic Word Searching"],"prefix":"10.1007","author":[{"given":"Paulo","family":"Martins","sequence":"first","affiliation":[]},{"given":"Leonel","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,14]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Chang, C., Yao, S., Yu, D.: Vectorized big integer operations for cryptosystems on the Intel MIC architecture. In: 2015 IEEE 22nd International Conference on High Performance Computing (HiPC), pp. 194\u2013203, December 2015","DOI":"10.1109\/HiPC.2015.54"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University, Stanford, CA, USA (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"3","key":"9_CR3","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010). http:\/\/doi.acm.org\/10.1145\/1666420.1666444","journal-title":"Commun. ACM"},{"key":"9_CR4","unstructured":"Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. Cryptology ePrint Archive, Report 2013\/340 (2013). http:\/\/eprint.iacr.org\/2013\/340"},{"key":"9_CR5","volume-title":"Intel Xeon Phi Coprocessor High Performance Programming","author":"J Jeffers","year":"2013","unstructured":"Jeffers, J., Reinders, J.: Intel Xeon Phi Coprocessor High Performance Programming, 1st edn. Morgan Kaufmann Publishers Inc., San Francisco (2013)","edition":"1"},{"key":"9_CR6","unstructured":"Khedr, A., Gulak, G., Vaikuntanathan, V.: Shield: scalable homomorphic implementation of encrypted data-classifiers. Cryptology ePrint Archive, Report 2014\/838 (2014). http:\/\/eprint.iacr.org\/"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Khelifi, M., Massicotte, D., Savaria, Y.: Parallel independent FFT implementation on intel processors and Xeon phi for LTE and OFDM systems. In: Nordic Circuits and Systems Conference (NORCAS): NORCHIP International Symposium on System-on-Chip (SoC), pp. 1\u20134, October 2015","DOI":"10.1109\/NORCHIP.2015.7364402"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Khelifi, M., Massicotte, D., Savaria, Y.: Towards efficient and concurrent FFTs implementation on Intel Xeon\/MIC clusters for LTE and HPC. In: 2016 IEEE International Symposium on Circuits and Systems (ISCAS), pp. 2611\u20132614, May 2016","DOI":"10.1109\/ISCAS.2016.7539128"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Mirsoleimani, S.A., Plaat, A., Van Den Herik, J., Vermaseren, J.: Scaling Monte Carlo tree search on Intel Xeon phi. In: 21st International Conference on Parallel and Distributed Systems (ICPADS), 2015, pp. 666\u2013673, December 2015","DOI":"10.1109\/ICPADS.2015.89"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Misra, G., Kurkure, N., Das, A., Valmiki, M., Das, S., Gupta, A.: Evaluation of rodinia codes on Intel Xeon Phi. In: 2013 4th International Conference on Intelligent Systems, Modelling and Simulation, pp. 415\u2013419, January 2013","DOI":"10.1109\/ISMS.2013.118"},{"key":"9_CR11","unstructured":"Reinders, J.: An overview of programming for Intel Xeon processors and Intel Xeon Phi coprocessors, November 2012. https:\/\/software.intel.com\/en-us\/mic-developer , Intel Corporation"},{"issue":"2","key":"9_CR12","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978). http:\/\/doi.acm.org\/10.1145\/359340.359342","journal-title":"Commun. ACM"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Rosales, C.: Porting to the Intel Xeon Phi: opportunities and challenges. In: 2013 Extreme Scaling Workshop (XSW 2013), pp. 1\u20137, August 2013","DOI":"10.1109\/XSW.2013.5"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-642-55224-3_52","volume-title":"Parallel Processing and Applied Mathematics","author":"E Saule","year":"2014","unstructured":"Saule, E., Kaya, K., \u00c7ataly\u00fcrek, \u00dc.V.: Performance evaluation of sparse matrix multiplication kernels on Intel Xeon Phi. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2013. LNCS, vol. 8384, pp. 559\u2013570. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55224-3_52"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing for Computational Science \u2013 VECPAR 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61982-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T18:30:16Z","timestamp":1659205816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61982-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319619811","9783319619828"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61982-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}