{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:58:24Z","timestamp":1774594704620,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1109\/fpl68686.2025.00025","type":"proceedings-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T19:48:24Z","timestamp":1774554504000},"page":"100-109","source":"Crossref","is-referenced-by-count":0,"title":["FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Zhihan","family":"Xu","sequence":"first","affiliation":[{"name":"University of Southern California,USA"}]},{"given":"Rajgopal","family":"Kannan","sequence":"additional","affiliation":[{"name":"DEVCOM Army Research Office"}]},{"given":"Viktor K.","family":"Prasanna","sequence":"additional","affiliation":[{"name":"University of Southern California,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2017.01.087"},{"key":"ref3","volume-title":"Security guidance for critical areas of focus in cloud computing","author":"Allience","year":"2009"},{"key":"ref4","author":"de Castro","year":"2021","journal-title":"Does fully homomorphic encryption need compute acceleration?"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"ref6","author":"Ebel","year":"2023","journal-title":"Orion: A fully homomorphic encryption compiler for private deep neural network inference"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071133"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/FPL53798.2021.00027"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM53951.2022.9786115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247696"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICFPT56656.2022.9974369"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3139318"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04850-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06428-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911300"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913850"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM60383.2024.00010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.52202\/068431-2731"},{"key":"ref22","first-page":"1651","article-title":"\\{GAZELLE\\}: A low latency framework for secure neural network inference","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Juvekar","year":"2018"},{"key":"ref23","article-title":"Thor: Secure transformer inference with homomorphic encryption","author":"Moon","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref26","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref31","author":"Liang","year":"2022","journal-title":"Number theoretic transform and its applications in lattice-based cryptosystems: A survey"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"ref34","volume-title":"5TH GEN AMD EPYC\u2122 PROCESSOR ARCHITECTURE","year":"2025"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1145\/3613424.3614302","article-title":"Mad: Memory-aware design techniques for accelerating fully homomorphic encryption","volume-title":"Proceedings of the 56th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"Agrawal","year":"2023"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2015.7293944"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486923"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614279"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3706628.3708879"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3106167"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref49","first-page":"27","article-title":"Classification of encrypted word embeddings using recurrent neural networks.","author":"Podschwadt","year":"2020","journal-title":"PrivateNLP@ WSDM"},{"key":"ref50","first-page":"69","article-title":"Efficient secure matrix multiplication over lwe-based homomorphic encryption","volume":"67","author":"Mishra","year":"2016","journal-title":"Tatra Mt. Math. Publ"}],"event":{"name":"2025 35th International Conference on Field-Programmable Logic and Applications (FPL)","location":"Leiden, Netherlands","start":{"date-parts":[[2025,9,1]]},"end":{"date-parts":[[2025,9,5]]}},"container-title":["2025 35th International Conference on Field-Programmable Logic and Applications (FPL)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11449056\/11449057\/11449120.pdf?arnumber=11449120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:27:24Z","timestamp":1774589244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11449120\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/fpl68686.2025.00025","relation":{},"subject":[],"published":{"date-parts":[[2025,9,1]]}}}