{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:39:22Z","timestamp":1773247162029,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Visvesvaraya PhD Scheme for Electronics and IT"},{"DOI":"10.13039\/501100008628","name":"Ministry of Electronics and Information Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008628","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education, Youth and Sports, Czech Republic"},{"name":"Artificial Intelligence Enabled Smart Contactless Technology Development for Smart Fencing"},{"DOI":"10.13039\/501100010218","name":"Department of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010218","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Smart Contactless Technology Development for Smart Fencing"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tc.2022.3198628","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T19:55:26Z","timestamp":1660593326000},"page":"1247-1260","source":"Crossref","is-referenced-by-count":15,"title":["A Resource Efficient Software-Hardware Co-Design of Lattice-Based Homomorphic Encryption Scheme on the FPGA"],"prefix":"10.1109","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2751-9702","authenticated-orcid":false,"given":"Bikram","family":"Paul","sequence":"first","affiliation":[{"name":"Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"given":"Tarun Kumar","family":"Yadav","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"given":"Balbir","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9714-7399","authenticated-orcid":false,"given":"Srinivasan","family":"Krishnaswamy","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2189-3656","authenticated-orcid":false,"given":"Gaurav","family":"Trivedi","sequence":"additional","affiliation":[{"name":"Department of Electronics and Electrical Engineering, Indian Institute of Technology Guwahati, Guwahati, Assam, India"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry","year":"2009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"ref9","first-page":"24","article-title":"Fully homomorphic encryption over the integers","volume-title":"Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn.","author":"Gentry"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023255"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2345388"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2498606"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HOST45689.2020.9300288"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2574340"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040950"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2015.7393335"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2018.2829539"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SiPS.2014.6986063"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2645204"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488680"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(87)90064-8"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/100811970"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12052"},{"key":"ref36","first-page":"885","article-title":"A new symmetric key homomorphic encryption scheme","volume-title":"Proc. 23rd Int. Symp. Math. Theory Netw. Syst.","author":"Dowerah"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.218"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACITT.2019.8779899"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2947899"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/RADIOELEK.2019.8733468"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10094223\/09857557.pdf?arnumber=9857557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T02:26:25Z","timestamp":1710383185000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9857557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":41,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tc.2022.3198628","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}