{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:34:16Z","timestamp":1725586456044},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,18]],"date-time":"2020-09-18T00:00:00Z","timestamp":1600387200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,18]]},"DOI":"10.1109\/accc51160.2020.9347935","type":"proceedings-article","created":{"date-parts":[[2021,2,17]],"date-time":"2021-02-17T22:48:24Z","timestamp":1613602104000},"page":"104-108","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Precision Integer Arithmetic Processing Using Arithmetic Circuit Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Zheng Hong","family":"Tew","sequence":"first","affiliation":[{"name":"Cybersecurity & Digital Forensics School of Informatics and IT Temasek Polytechnic,Singapore"}]},{"given":"Jia Sheng","family":"Leong","sequence":"additional","affiliation":[{"name":"Cybersecurity & Digital Forensics School of Informatics and IT Temasek Polytechnic,Singapore"}]},{"given":"Chern Nam","family":"Yap","sequence":"additional","affiliation":[{"name":"Cybersecurity & Digital Forensics School of Informatics and IT Temasek Polytechnic,Singapore"}]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-53887-6_1","article-title":"Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds","author":"chillotti","year":"2016","journal-title":"Asiacrypt 2016 Cryptology ePrint Archive"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8885277"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1063\/1.1745692"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/qjmam\/4.2.236"},{"key":"ref5","article-title":"Unix Programmer's Manual","author":"thompson","year":"1971","journal-title":"Bell Labs"},{"journal-title":"OpenMP 5 0 API Syntax Reference Guide","year":"0","author":"board","key":"ref8"},{"journal-title":"Mathematics of the Discrete Fourier Transform (DFT) with Audio Applications","year":"2007","author":"s","key":"ref7"},{"journal-title":"ISO\/IEC","article-title":"Programming languages - C++","year":"2017","key":"ref2"},{"journal-title":"BigNum A Portable and Efficient Package for Arbitrary-Precision","year":"1989","author":"bernard serpette","key":"ref9"},{"journal-title":"ISO\/IEC","article-title":"Information technology - Programming languages-C","year":"2018","key":"ref1"}],"event":{"name":"2020 Asia Conference on Computers and Communications (ACCC)","start":{"date-parts":[[2020,9,18]]},"location":"Singapore, Singapore","end":{"date-parts":[[2020,9,20]]}},"container-title":["2020 Asia Conference on Computers and Communications (ACCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9347889\/9347890\/09347935.pdf?arnumber=9347935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:45:10Z","timestamp":1656330310000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9347935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,18]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/accc51160.2020.9347935","relation":{},"subject":[],"published":{"date-parts":[[2020,9,18]]}}}