{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:15Z","timestamp":1763468235531},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/hpec.2014.7040950","type":"proceedings-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T19:50:25Z","timestamp":1424202625000},"page":"1-6","source":"Crossref","is-referenced-by-count":21,"title":["An FPGA co-processor implementation of Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"David Bruce","family":"Cousins","sequence":"first","affiliation":[]},{"given":"John","family":"Golusky","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Rohloff","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Sumorok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","author":"lyubashevsky","year":"0","journal-title":"Advances in Cryptology-EUROCRYPT 2010 Volume 6110 of Lecture Notes in Computer Science Chapter 1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666445"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"1","first-page":"129","article-title":"Implementing Gentry's Fully-Homomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Advances in Cryptology-EUROCRYPT 2011 Volume 6632 of Lecture Notes in Computer Science Chapter 9"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-02945-9","author":"cohen","year":"1993","journal-title":"A Course in Computational Algebraic Number Theory"},{"key":"6","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit","author":"gentry","year":"2012","journal-title":"Advances in Cryptology CRYPTO 2012 Volume 7417 of Lecture Notes in Computer Science"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_1"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_18"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408672"},{"key":"8","article-title":"Scalable implementation of primitives for homomorphic encryption-fpga implementation using simulink","author":"cousins","year":"2011","journal-title":"2011 High Perfor-mance Extreme Computing Workshop"}],"event":{"name":"2014 IEEE High Performance Extreme Computing Conference (HPEC)","start":{"date-parts":[[2014,9,9]]},"location":"Waltham, MA, USA","end":{"date-parts":[[2014,9,11]]}},"container-title":["2014 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7027306\/7040940\/07040950.pdf?arnumber=7040950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:43:56Z","timestamp":1498196636000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7040950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/hpec.2014.7040950","relation":{},"subject":[],"published":{"date-parts":[[2014,9]]}}}