{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T09:13:39Z","timestamp":1758273219951},"reference-count":26,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2018,1,6]],"date-time":"2018-01-06T00:00:00Z","timestamp":1515196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxx129","type":"journal-article","created":{"date-parts":[[2017,12,12]],"date-time":"2017-12-12T04:13:36Z","timestamp":1513052016000},"page":"575-585","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE"],"prefix":"10.1093","volume":"61","author":[{"given":"Husen","family":"Wang","sequence":"first","affiliation":[{"name":"Ant Financial Services Group. Building B, Huanglong Times Plaza, No.18 Wantang Road, Hangzhou, China"}]},{"given":"Qiang","family":"Tang","sequence":"additional","affiliation":[{"name":"Luxembourg Institute of Science and Technology, 5 Avenue des Hauts-Fourneaux, 4362 Esch-sur-Alzette, Luxembourg"}]}],"member":"286","published-online":{"date-parts":[[2018,1,6]]},"reference":[{"key":"key\n\t\t\t\t20180329074329_bxx129C1","author":"Gentry","year":"2009"},{"key":"key\n\t\t\t\t20180329074329_bxx129C2","author":"Brakerski","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C3","author":"L\u00f3pez-Alt","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C4","first-page":"868","volume-title":"Advances in Cryptology\u2014CRYPTO 2012, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, Lecture Notes in Computer Science","author":"Brakerski","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C5","author":"Fan","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C6","author":"Bos","year":"2013"},{"key":"key\n\t\t\t\t20180329074329_bxx129C7","first-page":"75","volume-title":"Advances in Cryptology\u2014CRYPTO 2013, Santa Barbara, CA, USA, August 18\u201322, 2013. Proceedings, Part I, Lecture Notes in Computer Science","author":"Gentry","year":"2013"},{"key":"key\n\t\t\t\t20180329074329_bxx129C8","author":"Brakerski","year":"2014"},{"key":"key\n\t\t\t\t20180329074329_bxx129C9","first-page":"297","volume-title":"Advances in Cryptology\u2014CRYPTO 2014, Santa Barbara, CA, USA, August 17\u201321, 2014, Proceedings, Part I, Lecture Notes in Computer Science","author":"Alperin-Sheriff","year":"2014"},{"key":"key\n\t\t\t\t20180329074329_bxx129C10","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1587\/transfun.E99.A.73","article-title":"Packing messages and optimizing bootstrapping in gsw-fhe","volume":"99","author":"Hiromasa","year":"2016","journal-title":"IEICE Trans. Fundamentals Electron. Commun. Comput. Sci."},{"key":"key\n\t\t\t\t20180329074329_bxx129C11","first-page":"617","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2015, Sofia, Bulgaria, April 26\u201330, 2015, Proceedings, Part I, Lecture Notes in Computer Science","author":"Ducas","year":"2015"},{"key":"key\n\t\t\t\t20180329074329_bxx129C12","first-page":"119","volume-title":"Progress in Cryptology--LATINCRYPT 2015, Guadalajara, Mexico, August 23\u201326, 2015, Proceedings, Lecture Notes in Computer Science","author":"Biasse","year":"2015"},{"key":"key\n\t\t\t\t20180329074329_bxx129C13","volume-title":"Polynomials and Polynomial Inequalities.","author":"Borwein","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C14","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1137\/120868669","article-title":"Efficient fully homomorphic encryption from (standard) LWE","volume":"43","author":"Brakerski","year":"2014","journal-title":"SIAM J. Comput."},{"key":"key\n\t\t\t\t20180329074329_bxx129C15","first-page":"311","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2015, Sofia, Bulgaria, April 26\u201330, 2015, Proceedings, Part I, Lecture Notes in Computer Science","author":"M\u00e9aux","year":"2016"},{"key":"key\n\t\t\t\t20180329074329_bxx129C16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1568318.1568324","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"Regev","year":"2009","journal-title":"J. ACM"},{"key":"key\n\t\t\t\t20180329074329_bxx129C17","author":"Peikert","year":"2009"},{"key":"key\n\t\t\t\t20180329074329_bxx129C18","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/0304-3975(87)90064-8","article-title":"A hierarchy of polynomial time lattice basis reduction algorithms","volume":"53","author":"Schnorr","year":"1987","journal-title":"Theor. Comput. Sci."},{"key":"key\n\t\t\t\t20180329074329_bxx129C19","first-page":"700","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2012, Cambridge, UK, April 15\u201319, 2012. Proceedings, Lecture Notes in Computer Science","author":"Micciancio","year":"2012"},{"key":"key\n\t\t\t\t20180329074329_bxx129C20","volume-title":"Guide to Elliptic Curve Cryptography","author":"Hankerson","year":"2006"},{"key":"key\n\t\t\t\t20180329074329_bxx129C21","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1093\/qjmam\/4.2.236","article-title":"A signed binary multiplication technique","volume":"4","author":"Booth","year":"1951","journal-title":"Q. J. Mech. Appl. Math."},{"key":"key\n\t\t\t\t20180329074329_bxx129C22","first-page":"123","volume-title":"Advances in Cryptology\u2014CRYPTO 2004, Santa Barbara, CA, USA, August 15\u201319, 2004, Lecture Notes in Computer Science","author":"Okeya","year":"2004"},{"key":"key\n\t\t\t\t20180329074329_bxx129C23","first-page":"595","volume-title":"Advances in Cryptology \u2013 CRYPTO 2009, Santa Barbara, CA, USA, August 16\u201320, 2009, Lecture Notes in Computer Science","author":"Applebaum","year":"2009"},{"key":"key\n\t\t\t\t20180329074329_bxx129C24","author":"Williams","year":"2014"},{"key":"key\n\t\t\t\t20180329074329_bxx129C25","author":"Naehrig","year":"2011"},{"key":"key\n\t\t\t\t20180329074329_bxx129C26","first-page":"313","volume-title":"Fast Software Encryption\u201423rd International Conference, FSE 2016, Bochum, Germany, March 20\u201323, 2016, Revised Selected Papers, Lecture Notes in Computer Science","author":"Canteaut","year":"2016"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/575\/24509695\/bxx129.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T11:43:36Z","timestamp":1522323816000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/575\/4791881"}},"subtitle":[],"editor":[{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1,6]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,1,6]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxx129","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2018,1,6]]}}}