{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T14:26:57Z","timestamp":1772720817048,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (FCT), Portugal","doi-asserted-by":"publisher","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European High Performance Computing Joint Undertaking (JU) under Framework Partnership Agreement","award":["800928"],"award-info":[{"award-number":["800928"]}]},{"name":"European High Performance Computing Joint Undertaking (JU) under Framework Partnership Agreement","award":["101036168 EPI SGA2"],"award-info":[{"award-number":["101036168 EPI SGA2"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. I"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tcsi.2022.3166550","type":"journal-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:45:00Z","timestamp":1651088700000},"page":"2669-2682","source":"Crossref","is-referenced-by-count":37,"title":["NTT Architecture for a Linux-Ready RISC-V Fully-Homomorphic Encryption Accelerator"],"prefix":"10.1109","volume":"69","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5554-7693","authenticated-orcid":false,"given":"Rogerio","family":"Paludo","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8066-221X","authenticated-orcid":false,"given":"Leonel","family":"Sousa","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T&#x00E9;cnico, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"263","reference":[{"issue":"11","key":"ref1","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3124441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref8","volume-title":"PALISADE Lattice Cryptography Library","year":"2021"},{"key":"ref9","volume-title":"Microsoft SEAL","year":"2020"},{"key":"ref10","volume-title":"PQC Standardization Process: Third Round Candidate Announcement","year":"2020"},{"issue":"5","key":"ref11","first-page":"1211","article-title":"High performance post-quantum key exchange on FPGAs","volume":"37","author":"Kuo","year":"2021","journal-title":"J. Inf. Sci. Eng."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2019.i4.17-61"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2019.8741027"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.49-72"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2019.2956651"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.2983185"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.239-280"},{"key":"ref18","article-title":"Hardware acceleration for homomorphic encryption","author":"Cathebras","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2019.00045"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.69-88"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3017930"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3064232"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP52443.2021.00033"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2619669"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3126558"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.06.001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2926114"},{"key":"ref33","volume-title":"The Fast Fourier Transform and its Applications","author":"Brigham","year":"1988"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1965-0178586-1"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref36","volume-title":"SHEEP Homomorphic Encryption Evaluation Platform","year":"2021"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1201\/9780367802332"},{"key":"ref38","volume-title":"Introduction to Algorithms","author":"Cormen","year":"2009"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.09.002"},{"key":"ref41","volume-title":"The Online Encyclopedia of Integer Sequences\u2014Proth Primes","year":"2003"},{"issue":"4","key":"ref42","first-page":"1","article-title":"CRYSTALS-Kyber algorithm specifications and supporting documentation","volume":"2","author":"Avanzi","year":"2021","journal-title":"NIST PQC Round"},{"key":"ref43","first-page":"1","article-title":"CRYSTALS-Dilithium algorithm specifications and supporting documentation","volume":"3","author":"Bai","year":"2021","journal-title":"NIST Post-Quantum Cryptogr. Standardization Round"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.2007.24"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/10586458.2001.10504447"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP52443.2021.00031"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_20"},{"key":"ref50","article-title":"Homomorphic encryption security standard","author":"Albrecht","year":"2018"},{"key":"ref51","volume-title":"Vivado Design Suite User Guide (UG901)","year":"2016"},{"key":"ref52","article-title":"High-speed NTT-based polynomial multiplication accelerator for CRYSTALS-Kyber post-quantum cryptography","author":"Bisheh-Niasar","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2008.2004540"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3119598"},{"key":"ref55","volume-title":"ABC: A System for Sequential Synthesis and Verification","year":"2021"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.23919\/DATE48585.2020.9116567"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i3.219-242"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.840301"},{"key":"ref59","volume-title":"RISC-V GNU Toolchain","year":"2021"},{"key":"ref60","volume-title":"Virtex UltraScale$ HBM VCU128 FPGA","year":"2021"},{"key":"ref61","volume-title":"UMCs 28 nm High-k\/Metal Gate Stack HPCU","year":"2021"},{"key":"ref62","volume-title":"Parametric NTT\/INTT Hardware Generator","author":"Mert","year":"2021"},{"key":"ref63","article-title":"Does fully homomorphic encryption need compute acceleration?","author":"de Castro","year":"2021","journal-title":"arXiv:2112.06396"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/FPL50879.2020.00016"}],"container-title":["IEEE Transactions on Circuits and Systems I: Regular Papers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8919\/9809931\/09763876.pdf?arnumber=9763876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:48:33Z","timestamp":1705963713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9763876\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":64,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcsi.2022.3166550","relation":{},"ISSN":["1549-8328","1558-0806"],"issn-type":[{"value":"1549-8328","type":"print"},{"value":"1558-0806","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}