{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:18:04Z","timestamp":1743074284825,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/sips.2014.6986063","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T19:59:15Z","timestamp":1419969555000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["Accelerating integer-based fully homomorphic encryption using Comba multiplication"],"prefix":"10.1109","author":[{"given":"Ciara","family":"Moore","sequence":"first","affiliation":[]},{"given":"Maire","family":"O'Neill","sequence":"additional","affiliation":[]},{"given":"Neil","family":"Hanley","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"O'Sullivan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_16"},{"key":"17","article-title":"Evaluating the hardware performance of a million-bit multiplier","author":"dor\ufffdz","year":"2013","journal-title":"16th Euromicro Conference on Digital System Design (DSD)"},{"journal-title":"Accelerating Fully Homomorphic Encryption in Hardware","year":"2013","author":"dor\ufffdz","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572408"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_14"},{"key":"13","article-title":"Batch fully homomorphic encryption over the integers","volume":"2013","author":"coron","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"11","first-page":"487","article-title":"Fully homomorphic encryption over the integers with shorter public keys","author":"coron","year":"2011","journal-title":"Crypto"},{"key":"12","first-page":"446","article-title":"Public key compression and modulus switching for fully homomorphic encryption over the integers","author":"coron","year":"2012","journal-title":"Eurocrypt"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1147\/sj.294.0526"},{"key":"20","article-title":"Accelerating fully homomorphic encryption over the integers with super-size hardware multiplier and modular reduction","volume":"2013","author":"cao","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"7 Series FPGAs Overview","year":"2014","key":"22"},{"key":"23","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"karatsuba","year":"1963","journal-title":"Soviet Physics Doklady"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0002-2"},{"journal-title":"Design of an efficient public-key cryptographic library for RISC-based smart cards","year":"1998","author":"dhem","key":"25"},{"key":"26","first-page":"311","article-title":"Implementing the Rivest, Shamir and Adleman public key encryption algorithm on a standard digital signal processor","author":"barrett","year":"1986","journal-title":"Crypto"},{"journal-title":"7 Series DSP48E1 Slice","year":"2013","key":"27"},{"journal-title":"7 Series FPGAs Memory Interface Solutions","year":"2011","key":"28"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/2213977.2214086","article-title":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","author":"l\ufffdpez-alt","year":"2012","journal-title":"STOC"},{"key":"2","article-title":"Fully homomorphic encryption without bootstrapping","volume":"18","author":"brakerski","year":"2011","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"10","article-title":"Homomorphic evaluation of the AES circuit","volume":"2012","author":"gentry","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"1"},{"key":"7","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"dijk","year":"2010","journal-title":"Eurocrypt"},{"key":"6","first-page":"420","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"smart","year":"2010","journal-title":"Public Key Cryptography"},{"key":"5","first-page":"129","article-title":"Implementing Gentry's fully-homomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Eurocrypt"},{"key":"4","article-title":"Multiparty computation from somewhat homomorphic encryption","author":"damg\ufffdrd","year":"2011","journal-title":"IACR Cryptology EPrint Archive Report 2011\/535"},{"key":"9","article-title":"Fully homomorphic encryption with polylog overhead","volume":"2011","author":"gentry","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"key":"8","article-title":"Better bootstrapping in fully homomorphic encryption","volume":"2011","author":"gentry","year":"2011","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2014 IEEE Workshop on Signal Processing Systems (SiPS)","start":{"date-parts":[[2014,10,20]]},"location":"Belfast, United Kingdom","end":{"date-parts":[[2014,10,22]]}},"container-title":["2014 IEEE Workshop on Signal Processing Systems (SiPS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6973465\/6986048\/06986063.pdf?arnumber=6986063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T09:43:46Z","timestamp":1598607826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6986063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/sips.2014.6986063","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}