{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:47:24Z","timestamp":1777654044743,"version":"3.51.4"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFB2702000"],"award-info":[{"award-number":["2022YFB2702000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62132008"],"award-info":[{"award-number":["62132008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372417"],"award-info":[{"award-number":["62372417"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002239"],"award-info":[{"award-number":["62002239"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076125"],"award-info":[{"award-number":["62076125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20176"],"award-info":[{"award-number":["U20A20176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Jiangsu Province, China","award":["BK20220075"],"award-info":[{"award-number":["BK20220075"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tdsc.2024.3363900","type":"journal-article","created":{"date-parts":[[2024,2,8]],"date-time":"2024-02-08T19:04:54Z","timestamp":1707419094000},"page":"4895-4906","source":"Crossref","is-referenced-by-count":26,"title":["Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9735-255X","authenticated-orcid":false,"given":"Hao","family":"Yang","sequence":"first","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7287-4223","authenticated-orcid":false,"given":"Shiyu","family":"Shen","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5192-1649","authenticated-orcid":false,"given":"Wangchen","family":"Dai","sequence":"additional","affiliation":[{"name":"Zhejiang Lab, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6240-6688","authenticated-orcid":false,"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8578-2635","authenticated-orcid":false,"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang Lab, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2623-9170","authenticated-orcid":false,"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. 33nd Int. Conf. Mach. Learn.","author":"Dowlin"},{"key":"ref2","first-page":"812","article-title":"Low latency privacy preserving inference","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Brutzkus"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196503"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref6","article-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref8","first-page":"617","article-title":"FHEW: Bootstrapping homomorphic encryption in less than a second","volume-title":"Proc. 34th Annu. Int. Conf. Theory Appl. Cryptogr. Techn.","author":"Ducas"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref12","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref14","article-title":"HElib"},{"key":"ref15","article-title":"PALISADE"},{"key":"ref16","article-title":"SEAL Microsoft (release 4.0)","year":"2023"},{"key":"ref17","article-title":"HEAAN","year":"2023"},{"key":"ref18","article-title":"Full RNS-HEAAN","year":"2022"},{"key":"ref19","article-title":"Open FHE","year":"2023"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3021238"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3227874"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1994-1185244-1"},{"issue":"2","key":"ref34","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1007\/s11227-021-03980-5","article-title":"Efficient number theoretic transform implementation on GPU for homomorphic encryption","volume":"78","author":"\u00d6zerk","year":"2022","journal-title":"J. Supercomput."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00033"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1464291.1464352"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.09.002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"ref39","first-page":"293","article-title":"Multiplication of many-digital numbers by automatic computers","volume":"145","author":"Karatsuba","year":"1962","journal-title":"Doklady Akademii Nauk"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"ref41","article-title":"Homomorphic encryption on GPU","volume":"2022","author":"\u00d6zcan","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/hpca56546.2023.10071017"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10663874\/10428046.pdf?arnumber=10428046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:07:52Z","timestamp":1725484072000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10428046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3363900","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}