{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:37:05Z","timestamp":1771612625557,"version":"3.50.1"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["IITP-2021-0-02052"],"award-info":[{"award-number":["IITP-2021-0-02052"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2024-00432449"],"award-info":[{"award-number":["RS-2024-00432449"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3473903","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T17:37:42Z","timestamp":1728063462000},"page":"147220-147234","source":"Crossref","is-referenced-by-count":6,"title":["Configurable Arithmetic Core Architecture for RNS-CKKS Homomorphic Encryption"],"prefix":"10.1109","volume":"12","author":[{"given":"Chulwoo","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"given":"Hanyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5400-0995","authenticated-orcid":false,"given":"Ardianto","family":"Satriawan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8815-1927","authenticated-orcid":false,"given":"Hanho","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Inha University, Incheon, South Korea"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A guide to fully homomorphic encryption","author":"Armknecht","year":"2015"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2021.1965918"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00756-z"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35535-6_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad093"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986580"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/e24040519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICAAIC53929.2022.9793310"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3292411"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.01.021"},{"key":"ref11","first-page":"87","article-title":"Natural language processing","volume-title":"Fundamentals of Artificial Intelligence","author":"Fanni","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/a15110418"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/KSE59128.2023.10299436"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0597-z"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3302065"},{"key":"ref16","article-title":"FheFL: Fully homomorphic encryption friendly privacy-preserving federated learning with Byzantine users","author":"Rahulamathavan","year":"2023","journal-title":"arXiv:2306.05112"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-57543-3_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-1946-8_40"},{"issue":"11","key":"ref19","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43214-9_3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59663-6_6"},{"key":"ref22","article-title":"The elgamal cryptosystem","volume-title":"Joint Advanced Students Seminar","author":"Meier","year":"2005"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TICST.2015.7369385"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2018.8350968"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s23104594"},{"key":"ref33","article-title":"CiFlow: Dataflow analysis and optimization of key switching for homomorphic encryption","author":"Neda","year":"2023","journal-title":"arXiv:2311.01598"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i4.32-57"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"ref40","article-title":"Remark on the security of ckks scheme in practice","author":"Cheon","year":"2020"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02316-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.463-500"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294446"},{"key":"ref49","volume-title":"A complete beginner guide to the number theoretic transform (NTT)","author":"Satriawan","year":"2024"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_18"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2022.3166355"},{"key":"ref53","article-title":"Number theoretic transform and its applications in lattice-based cryptosystems: A survey","author":"Liang","year":"2022","journal-title":"arXiv:2211.13546"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.2307\/2003354"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAS.2012.6306117"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3225208"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3215903"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3289489"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3386977"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1985-0777282-x"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_31"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676912"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.18"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3144101"},{"key":"ref68","article-title":"Ultrascale architecture and product data sheet: Overview","author":"Xilinx","year":"2020"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2922999"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10705283.pdf?arnumber=10705283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:39:21Z","timestamp":1732667961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705283\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3473903","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}