{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:38:35Z","timestamp":1771612715605,"version":"3.50.1"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT (MSIT), South Korea, under the Information Technology Research Center","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information and Communications Technology Planning and Evaluation","award":["IITP-2021-0-02052"],"award-info":[{"award-number":["IITP-2021-0-02052"]}]},{"name":"Commercialization Promotion Agency for Research and Development Outcomes"},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2024-00432449"],"award-info":[{"award-number":["RS-2024-00432449"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010418","name":"Korean Government","doi-asserted-by":"publisher","award":["2021R1A2C1011232"],"award-info":[{"award-number":["2021R1A2C1011232"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3473901","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T17:37:42Z","timestamp":1728063462000},"page":"147283-147300","source":"Crossref","is-referenced-by-count":7,"title":["Integer Modular Multiplication With Barrett Reduction and Its Variants for Homomorphic Encryption Applications: A Comprehensive Review and an Empirical Study"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5400-0995","authenticated-orcid":false,"given":"Ardianto","family":"Satriawan","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"given":"Rella","family":"Mareta","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-1927","authenticated-orcid":false,"given":"Hanho","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090354"},{"key":"ref2","volume-title":"Quantum Computing: The Risk to Existing Encryption Methods","author":"Kirsch","year":"2015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"issue":"131","key":"ref4","first-page":"164","article-title":"NIST post-quantum cryptography standardization","volume":"800","author":"Chen","year":"2017","journal-title":"Transition"},{"key":"ref5","first-page":"1","article-title":"Homomorphic encryption algorithms and schemes for secure computations in the cloud","volume-title":"Proc. Int. Conf. Secure Comput. Technol.","volume":"19","author":"Alkharji"},{"issue":"11","key":"ref6","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294446"},{"key":"ref8","article-title":"A complete beginner guide to the number theoretic transform (NTT)","author":"Satriawan","year":"2024"},{"key":"ref9","article-title":"CRYSTALS-kyber algorithm specifications and supporting documentation (version 3.0)","author":"Avanzi","year":"2021"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS58744.2024.10558097"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3386977"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISOCC59558.2023.10396598"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/s23177389"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography7040046"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/les.2024.3410516"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2024.3357836"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3431920.3439306"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3313783"},{"key":"ref27","article-title":"Elliptic curve cryptography for lightweight applications","author":"Hitchcock","year":"2003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-009-0398-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-7666-9_9"},{"key":"ref30","article-title":"A guide to fully homomorphic encryption","author":"Armknecht","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1965918"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00756-z"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35535-6_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad093"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986580"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/e24040519"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC53929.2022.9793310"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3292411"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.01.021"},{"key":"ref40","first-page":"87","article-title":"Natural language processing","volume-title":"Fundamentals of Artificial Intelligence","author":"Fanni","year":"2023"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/a15110418"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/KSE59128.2023.10299436"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0597-z"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302065"},{"key":"ref45","article-title":"FheFL: Fully homomorphic encryption friendly privacy-preserving federated learning with Byzantine users","author":"Rahulamathavan","year":"2023","journal-title":"arXiv:2306.05112"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57543-3_8"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-1946-8_40"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43214-9_3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3473903"},{"key":"ref53","article-title":"Hardware implementation of Barrett reduction exploiting constant multiplication","author":"Roma","year":"2019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_31"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676912"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2012.6467863"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.18"},{"issue":"2","key":"ref58","first-page":"293","article-title":"Multiplication of many-digital numbers by automatic computers","volume":"145","author":"Karatsuba","year":"1962","journal-title":"Doklady Akademii Nauk"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73074-3_10"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3252504"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/BF02242355"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3144101"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3289489"},{"key":"ref65","article-title":"Ultrascale architecture and product data sheet: Overview","author":"Xilinx","year":"2020"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2922999"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.862237"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2599269"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2017.2771239"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/PRIME.2019.8787740"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref73","article-title":"NTL: A library for doing number theory","author":"Shoup","year":"2001"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED52811.2021.9502490"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS46773.2023.10181714"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10705155.pdf?arnumber=10705155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:39:52Z","timestamp":1732667992000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705155\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3473901","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}