{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T09:50:55Z","timestamp":1769161855724,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/hst.2019.8741036","type":"proceedings-article","created":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T02:17:09Z","timestamp":1561083429000},"page":"131-140","source":"Crossref","is-referenced-by-count":10,"title":["CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution"],"prefix":"10.1109","author":[{"given":"Mohammed","family":"Nabeel","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Ashraf","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Chielle","sequence":"additional","affiliation":[]},{"given":"Nektarios G.","family":"Tsoutsos","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ASPDAC.2018.8297404"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2419619"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2645204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS.2017.7934578"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref13","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref15","first-page":"756","article-title":"Conditional branching is not necessary for universal computation in von Neumann computers","volume":"2","author":"rojas","year":"1996","journal-title":"Journal of Universal Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2569062"},{"key":"ref17","article-title":"A simple multi-processor computer based on subleq","author":"mazonka","year":"2011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_1"},{"key":"ref19","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-662-48324-4_9","article-title":"Modular hardware architecture for somewhat homomorphic function evaluation","volume":"9293","author":"roy","year":"2015","journal-title":"Cryptographic Hardware and Embedded Systems-CHES"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TC.2016.2574340","article-title":"A custom accelerator for homomorphic encryption applications","volume":"66","author":"\u00f6zt\u00fcrk","year":"2016","journal-title":"IEEE Transactions on Computers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref29","first-page":"1622","article-title":"Securing the Cloud with Reconfigurable Computing: An FPGA Accelerator for Homomorphic Encryption","author":"alessandro cilardo","year":"2016","journal-title":"Design Automation Test in Europe Conference Exhibition (DATE)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2287186"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_16"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2014.06.003"},{"key":"ref1","first-page":"1287","article-title":"Cloud computing security case studies and research","author":"barron","year":"2013","journal-title":"World Congress on Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45238-6_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2018.2812814"},{"key":"ref21","author":"rabin","year":"1979","journal-title":"Technical Report MIT\/LCS\/TR-212"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"ref23","first-page":"129","article-title":"Implementing gentry&#x2019;s fully-homomorphic encryption scheme","author":"gentry","year":"2010","journal-title":"Eurocrypt"},{"key":"ref26","article-title":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","author":"lopez-alt","year":"2013","journal-title":"Cryptology EPrint Archive Report 2013\/496"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2619669"}],"event":{"name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"McLean, VA, USA","start":{"date-parts":[[2019,5,5]]},"end":{"date-parts":[[2019,5,10]]}},"container-title":["2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8736108\/8740830\/08741036.pdf?arnumber=8741036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:11:50Z","timestamp":1657854710000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8741036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/hst.2019.8741036","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}