{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T08:08:37Z","timestamp":1761293317632,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/asap.2015.7245720","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:34:48Z","timestamp":1441946088000},"page":"128-135","source":"Crossref","is-referenced-by-count":9,"title":["Accelerating bootstrapping in FHEW using GPUs"],"prefix":"10.1109","author":[{"given":"Moon Sung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yongje","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]},{"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","article-title":"Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based","volume":"8042","author":"gentry","year":"2013","journal-title":"Advances in Cryptology - CRYPTO 2013"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_21"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","article-title":"Implementing Gentry's fully-homomorphic encryption scheme","volume":"6632","author":"gentry","year":"2011","journal-title":"Advances in Cryptology EuroCrypt 2011 Lecture Notes in Computer Science"},{"article-title":"HElib: Software library for homomorphic encryption","year":"2013","author":"halevi","key":"ref15"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1007\/978-3-662-46800-5_25","article-title":"Bootstrapping for HElib","volume":"9056","author":"halevi","year":"2015","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2015"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-662-46800-5_24","article-title":"FHEW: bootstrapping homomorphic encryption in less than a second","volume":"9056","author":"ducas","year":"2015","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2015 ser Lecture Notes in Computer Science"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-540-85053-3_6","article-title":"Exploiting the Power of GPUs for Asymmetric Cryptography","volume":"5154","author":"szerwinski","year":"2008","journal-title":"Cryptographic Hardware and Embedded Systems &#x2013; CHES 2008 ser Lecture Notes in Computer Science"},{"journal-title":"Amazon","year":"0","key":"ref4"},{"journal-title":"Nvidia","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Nimbix","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","article-title":"Fully homomorphic encryption from Ring-LWE and security for key dependent messages","volume":"6841","author":"brakerski","year":"2011","journal-title":"Advances in Cryptology-CRYPTO 2011"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully homomorphic encryption over the integers","volume":"6110","author":"van dijk","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1687399.1687451"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"ref1","article-title":"Computing without processors","author":"signh","year":"2011","journal-title":"Communications of the ACM ACM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2011.6043261"},{"key":"ref22","first-page":"1","article-title":"Accelerating fully homomorphic encryption using GPUs","author":"wang","year":"2012","journal-title":"IEEE Conference on High Performance Extreme Computing HPEC 2012 Waltham MA USA September 10&#x2013;12 2012"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660316"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/HPEC.2014.7041001","article-title":"Accelerating NTRU based homomorphic encryption using GPUs","author":"dai","year":"2014","journal-title":"IEEE High Performance Extreme Computing Conference HPEC 2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865755"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.840301"},{"journal-title":"Nvidia","year":"0","key":"ref25"}],"event":{"name":"2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2015,7,27]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2015,7,29]]}},"container-title":["2015 IEEE 26th International Conference on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7227129\/7245687\/07245720.pdf?arnumber=7245720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T10:24:27Z","timestamp":1567160667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7245720\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/asap.2015.7245720","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}