{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T22:43:28Z","timestamp":1774219408031,"version":"3.50.1"},"reference-count":66,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T00:00:00Z","timestamp":1652572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,15]],"date-time":"2022-05-15T00:00:00Z","timestamp":1652572800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,15]]},"DOI":"10.1109\/fccm53951.2022.9786123","type":"proceedings-article","created":{"date-parts":[[2022,6,3]],"date-time":"2022-06-03T19:48:36Z","timestamp":1654285716000},"page":"1-10","source":"Crossref","is-referenced-by-count":26,"title":["IMpress: Large Integer Multiplication Expression Rewriting for FPGA HLS"],"prefix":"10.1109","author":[{"given":"Ecenur","family":"Ustun","sequence":"first","affiliation":[{"name":"Cornell University,School of Electrical and Computer Engineering,Ithaca,NY,USA"}]},{"given":"Ismail","family":"San","sequence":"additional","affiliation":[{"name":"Eski&#x015F;ehir Technical University,Department of Electrical and Electronics Engineering,Eski&#x015F;ehir,Turkey"}]},{"given":"Jiaqi","family":"Yin","sequence":"additional","affiliation":[{"name":"University of Utah,Department of Electrical and Computer Engineering,Salt Lake City,UT,USA"}]},{"given":"Cunxi","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Utah,Department of Electrical and Computer Engineering,Salt Lake City,UT,USA"}]},{"given":"Zhiru","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University,School of Electrical and Computer Engineering,Ithaca,NY,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737959"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_59"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1147\/sj.294.0526"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1969-0249212-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-017-0217-x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/543552.512566"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1066100.1066102"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56883-2_11"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2017.35"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3460945.3464953"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3400302.3415657"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH51176.2021.00013"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921698"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2873289"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3469660"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359630"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2013.6718340"},{"key":"ref29","article-title":"Multiplication of Multidigit Numbers on Automata","author":"karatsuba","year":"1963","journal-title":"Soviet Physics Doklady"},{"key":"ref2","article-title":"Parameter Space for the Architecture of FFT-Based Montgomery Modular Multiplication","author":"chen","year":"2015","journal-title":"IEEE Trans on Computers (TC)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2010.89"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446707"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407799"},{"key":"ref24","article-title":"Co-Optimization of Design and Fabrication Plans for Carpentry","author":"zhao","year":"2021"},{"key":"ref23","article-title":"Equality Saturation for Tensor Graph Superoptimization","author":"yang","year":"2021","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2513673"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2011.2110592"},{"key":"ref50","article-title":"Implementing Gentry&#x2019;s Fully-Homomorphic Encryption Scheme","author":"gentry","year":"2011","journal-title":"Int&#x2019;l Conf on the Theory and Applications of Cryptographic Techniques (EUROCRYPT)"},{"key":"ref51","article-title":"Bootstrapping Fully Homomorphic Encryption over the Integers in Less than One Second","author":"pereira","year":"2020","journal-title":"Public Key Cryptography Conf"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2014.6927419"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593234"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2011.48"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1723112.1723123"},{"key":"ref55","article-title":"Vitis Security Library","year":"2020"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345388"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63618-0_9"},{"key":"ref52","article-title":"Can Sch&#x00F6;nhage Multiplication Speed Up the RSA Decryption or Encryption?","author":"garc?a","year":"2007","journal-title":"Technische Universit&#x00E4;t Darmstadt"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3431920.3439299"},{"key":"ref40","article-title":"Techniques for Program Verification","author":"nelson","year":"1980","journal-title":"Stanford University"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2677426"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/DATE51398.2021.9473908"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2018.8464809"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.215"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2498606"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2691727"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1594834.1480915"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3434304"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3013266"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2015.7393116"},{"key":"ref6","article-title":"An FPGA-based Programmable Vector Engine for Fast Fully Homo-morphic Encryption over the Torus","author":"gener","year":"2021","journal-title":"Secure and Private Systems for Machine Learning (SPSL)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988379"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3126558"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00027"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"ref45","article-title":"A Fully Homomorphic Encryption Scheme","author":"gentry","year":"2009","journal-title":"Stanford University"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref42","article-title":"On a Bicriterion Formulation of the Problems of Integrated System Identification and System Optimization","author":"haimes","year":"1971","journal-title":"IEEE Transactions on Systems Man and Cybernetics (TSMC)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32033-3_33"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.25080\/TCWV9851","article-title":"Exploring Network Structure, Dynamics, and Function using NetworkX","author":"hagberg","year":"2008","journal-title":"7th Python in Science Conference (SciPy)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.75"}],"event":{"name":"2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)","location":"New York City, NY, USA","start":{"date-parts":[[2022,5,15]]},"end":{"date-parts":[[2022,5,18]]}},"container-title":["2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9786061\/9786064\/09786123.pdf?arnumber=9786123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T12:18:39Z","timestamp":1727353119000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9786123\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,15]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/fccm53951.2022.9786123","relation":{},"subject":[],"published":{"date-parts":[[2022,5,15]]}}}