{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:39:37Z","timestamp":1730241577261,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T00:00:00Z","timestamp":1675555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T00:00:00Z","timestamp":1675555200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,5]]},"DOI":"10.1109\/iceic57457.2023.10049852","type":"proceedings-article","created":{"date-parts":[[2023,3,10]],"date-time":"2023-03-10T13:20:59Z","timestamp":1678454459000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["GPU Acceleration of Chinese Remainder Theorem for Fully Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Yuri","family":"Oh","sequence":"first","affiliation":[{"name":"Hanyang University,Dept of Electronic Engineering,Seoul,Korea"}]},{"given":"Seong-Cheon","family":"Park","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept of Electronic Engineering,Seoul,Korea"}]},{"given":"Jung-Chan","family":"Na","sequence":"additional","affiliation":[{"name":"Electronics and Telecommunications Research Institute,Dept of Security Vulnerability Analysis Lab,Daejon,Korea"}]},{"given":"Dong Kyue","family":"Kim","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept of Electronic Engineering,Seoul,Korea"}]}],"member":"263","reference":[{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref4","first-page":"6","article-title":"On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries","volume":"24","author":"carey","year":"0"},{"year":"0","key":"ref3","article-title":"NTL: A Library for doing Number Theory"},{"article-title":"HELR: Homomorphic Logistic Regression on Encrypted Data","year":"2022","author":"han","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1987.1165220"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.917757"},{"key":"ref1","article-title":"Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography","author":"pei","year":"1996","journal-title":"World Scientific"}],"event":{"name":"2023 International Conference on Electronics, Information, and Communication (ICEIC)","start":{"date-parts":[[2023,2,5]]},"location":"Singapore","end":{"date-parts":[[2023,2,8]]}},"container-title":["2023 International Conference on Electronics, Information, and Communication (ICEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10049840\/10049805\/10049852.pdf?arnumber=10049852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T14:48:19Z","timestamp":1681138099000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10049852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,5]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/iceic57457.2023.10049852","relation":{},"subject":[],"published":{"date-parts":[[2023,2,5]]}}}