{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:10:05Z","timestamp":1751094605935,"version":"3.41.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,25]]},"DOI":"10.1109\/iscas56072.2025.11043933","type":"proceedings-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T17:42:19Z","timestamp":1751046139000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient NTT-Based Polynomial Multiplication Architecture for BFV Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Rella","family":"Mareta","sequence":"first","affiliation":[{"name":"Inha University,Department of Electrical and Computer Engineering,Incheon,South Korea"}]},{"given":"Ardianto","family":"Satriawan","sequence":"additional","affiliation":[{"name":"Inha University,Department of Electrical and Computer Engineering,Incheon,South Korea"}]},{"given":"Hanho","family":"Lee","sequence":"additional","affiliation":[{"name":"Inha University,Department of Electrical and Computer Engineering,Incheon,South Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp3010004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2022.3162869"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0046"},{"key":"ref9","article-title":"A new perspective on key switching for BGV-like schemes","author":"Mono","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294446"},{"key":"ref11","article-title":"A complete beginner guide to the number theoretic transform (NTT)","author":"Satriawan","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSICT.2012.6467863"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3473901"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_31"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CISE.2010.5676912"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2023.3336951"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3205552"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3017930"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13173382"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2023.3260811"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103219"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.269-306"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3386977"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2022.3144101"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2922999"}],"event":{"name":"2025 IEEE International Symposium on Circuits and Systems (ISCAS)","start":{"date-parts":[[2025,5,25]]},"location":"London, United Kingdom","end":{"date-parts":[[2025,5,28]]}},"container-title":["2025 IEEE International Symposium on Circuits and Systems (ISCAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11043142\/11042930\/11043933.pdf?arnumber=11043933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:35:01Z","timestamp":1751092501000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11043933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,25]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iscas56072.2025.11043933","relation":{},"subject":[],"published":{"date-parts":[[2025,5,25]]}}}