{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:56:59Z","timestamp":1770541019292,"version":"3.49.0"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2032"],"award-info":[{"award-number":["U21B2032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62104098"],"award-info":[{"award-number":["62104098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Jiangsu Province for Youth","award":["BK20210178"],"award-info":[{"award-number":["BK20210178"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3600104"],"award-info":[{"award-number":["2021YFB3600104"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3354275","type":"journal-article","created":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:21:58Z","timestamp":1705353718000},"page":"11850-11864","source":"Crossref","is-referenced-by-count":5,"title":["Heterogeneous Reconfigurable Accelerator for Homomorphic Evaluation on Encrypted Data"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8806-8717","authenticated-orcid":false,"given":"Wenqing","family":"Song","sequence":"first","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"given":"Sirui","family":"Shen","sequence":"additional","affiliation":[{"name":"Centrum Wiskunde &#x0026; Informatica (CWI Amsterdam), Amsterdam, The Netherlands"}]},{"given":"Congwei","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"given":"Yilin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1351-5460","authenticated-orcid":false,"given":"Yuxiang","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Integrated Circuit, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1047-6067","authenticated-orcid":false,"given":"Li","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic Science and Engineering, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0061-3475","authenticated-orcid":false,"given":"Zhonghai","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Kista, Stockholm, Sweden"}]}],"member":"263","reference":[{"issue":"11","key":"ref1","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref4","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref6","first-page":"409","volume-title":"Proc. Int. Conf. Intell. Syst. Commun., IoT Secur. (ICISCoIS)","author":"Cheon"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref8","first-page":"1651","article-title":"Gazelle: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Juvekar"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2969633"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3114032"},{"key":"ref11","volume-title":"Microsoft SEAL(Release 4.1)","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2004932"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3017930"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3265583"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3163970"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3260811"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3218192"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_21"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_19"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.49-72"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2022.i1.94-126"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507772"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2019.8662528"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3197895"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10400455.pdf?arnumber=10400455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T08:34:58Z","timestamp":1706776498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10400455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3354275","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}