{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:23:36Z","timestamp":1774628616337,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,9]],"date-time":"2023-07-09T00:00:00Z","timestamp":1688860800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,7,9]]},"DOI":"10.1109\/dac56929.2023.10247696","type":"proceedings-article","created":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T17:31:31Z","timestamp":1694799091000},"page":"1-6","source":"Crossref","is-referenced-by-count":9,"title":["CHAM: A Customized Homomorphic Encryption Accelerator for Fast Matrix-Vector Product"],"prefix":"10.1109","author":[{"given":"Xuanle","family":"Ren","sequence":"first","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Zhaohui","family":"Chen","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Zhen","family":"Gu","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Yanheng","family":"Lu","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Ruiguang","family":"Zhong","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Wen-Jie","family":"Lu","sequence":"additional","affiliation":[{"name":"Ant Group,China"}]},{"given":"Jiansong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Yichi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Hanghang","family":"Wu","sequence":"additional","affiliation":[{"name":"Ant Group,AntChain,China"}]},{"given":"Xiaofu","family":"Zheng","sequence":"additional","affiliation":[{"name":"Ant Group,AntChain,China"}]},{"given":"Heng","family":"Liu","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Tingqiang","family":"Chu","sequence":"additional","affiliation":[{"name":"Ant Group,AntChain,China"}]},{"given":"Cheng","family":"Hong","sequence":"additional","affiliation":[{"name":"Ant Group,China"}]},{"given":"Changzheng","family":"Wei","sequence":"additional","affiliation":[{"name":"Ant Group,AntChain,China"}]},{"given":"Dimin","family":"Niu","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]},{"given":"Yuan","family":"Xie","sequence":"additional","affiliation":[{"name":"Alibaba Group,DAMO Academy,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2019-0026"},{"key":"ref5","article-title":"Low Latency Privacy Preserving Inference","volume-title":"ICML","author":"Brutzkus"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2350431"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"ref11","article-title":"CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy","volume-title":"ICML","author":"Dowlin"},{"key":"ref12","article-title":"Somewhat Practical Fully Homomorphic Encryption","volume-title":"15th International Conference on Practice and Theory in Public Key Cryptography","author":"Fan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"ref14","article-title":"BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption","volume-title":"ACM Conference","author":"Geelen"},{"key":"ref15","article-title":"A Fully Homomorphic Encryption Scheme","volume-title":"Ph.D. dissertation","author":"Gentry","year":"2009"},{"key":"ref16","article-title":"Private Federated Learning on Vertically Partitioned Data via Entity Resolution and Additively Homomorphic Encryption","author":"Hardy","year":"2017"},{"key":"ref17","article-title":"CryptoDL: Deep Neural Networks over Encrypted Data","author":"Hesamifard","year":"2017"},{"key":"ref18","article-title":"Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference","author":"Huang","year":"2022","journal-title":"USENIX Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096189"},{"key":"ref21","article-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference","volume-title":"27th USENIX Security Symposium","author":"Juvekar"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00043"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2645204"},{"key":"ref28","article-title":"DELPHI: A Cryptographic Inference Service for Neural Networks","volume-title":"29th USENIX Security Symposium","author":"Mishra"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/321450.321457"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"}],"event":{"name":"2023 60th ACM\/IEEE Design Automation Conference (DAC)","location":"San Francisco, CA, USA","start":{"date-parts":[[2023,7,9]]},"end":{"date-parts":[[2023,7,13]]}},"container-title":["2023 60th ACM\/IEEE Design Automation Conference (DAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10247654\/10247655\/10247696.pdf?arnumber=10247696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T01:17:26Z","timestamp":1705022246000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10247696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,9]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/dac56929.2023.10247696","relation":{},"subject":[],"published":{"date-parts":[[2023,7,9]]}}}