{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:00:19Z","timestamp":1775638819972,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100007270","name":"University of Michigan","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007270","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006919","name":"MIT","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006919","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency (DARPA)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory (AFRL)","doi-asserted-by":"publisher","award":["FA8750-11-C-0098"],"award-info":[{"award-number":["FA8750-11-C-0098"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Emerg. Topics Comput."],"published-print":{"date-parts":[[2017,4,1]]},"DOI":"10.1109\/tetc.2016.2619669","type":"journal-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T14:21:26Z","timestamp":1476973286000},"page":"193-206","source":"Crossref","is-referenced-by-count":48,"title":["Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor"],"prefix":"10.1109","volume":"5","author":[{"given":"David Bruce","family":"Cousins","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Rohloff","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Sumorok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"ref38","first-page":"1","article-title":"Accelerating NTRU based homomorphic encryption using GPUs","author":"dai","year":"2014","journal-title":"Proc High Performance Extreme Computing Conf"},{"key":"ref33","article-title":"Modular hardware architecture for somewhat homomorphic function evaluation","volume":"2015","author":"roy","year":"2015","journal-title":"ICAR Cryptology ePrint Archive"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.96"},{"key":"ref31","first-page":"169","article-title":"cuHE: A homomorphic encryption accelerator library","author":"dai","year":"2015","journal-title":"Proc Int Conf Cryptography Inf Secur Balkans"},{"key":"ref30","article-title":"Manual for using homomorphic encryption for bioinformatics","author":"dowlin","year":"2015","journal-title":"Microsoft Research Beijing China Tech Rep MSR-TR-2015&#x2013;87"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"ref36","article-title":"Homomorphic AES evaluation using NTRU","volume":"2014","author":"dor\u00f6z","year":"2014","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040950"},{"key":"ref34","first-page":"129","article-title":"Implementing Gentry&#x2019;s fully homomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Advances in Cryptology"},{"key":"ref10","first-page":"185","article-title":"Accelerating LTV based homomorphic encryption in reconfigurable hardware","author":"dor\u00f6z","year":"2015","journal-title":"Proc Int Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666445"},{"key":"ref11","first-page":"164","article-title":"Modular hardware architecture for somewhat homomorphic function evaluation","author":"roy","year":"2015","journal-title":"Proc Int Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref12","first-page":"221","article-title":"A scalable implementation of fully homomorphic encryption built on NTRU","author":"rohloff","year":"2014","journal-title":"Proceedings of the 2nd Workshop on Applied Homomorphic Cryptography (WAHC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_3"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/BF02242355","article-title":"Schnelle Multiplikation grosser Zahlen","volume":"7","author":"sch","year":"1971","journal-title":"Computing"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s00200-014-0218-3","article-title":"Sampling from discrete Gaussians for lattice-based cryptography on a constrained device","volume":"25","author":"dwarakanath","year":"2014","journal-title":"Applicable Algebra Eng Commun Comput"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_1"},{"key":"ref18","first-page":"1","article-title":"BKZ 2.0: Better lattice security estimates","author":"chen","year":"2011","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref19","first-page":"318","author":"lepoint","year":"2014","journal-title":"A Comparison of the Homomorphic Encryption Schemes FV and YASHE"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2011.5945661"},{"key":"ref4","article-title":"Multikey fully homomorphic encryption and on-the-fly multiparty computation","volume":"2013","author":"l\u00f3pez-alt","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1007\/978-1-4419-5906-5_417","article-title":"Lattice-based cryptography","author":"micciancio","year":"2011","journal-title":"Encyclopedia of Cryptography and Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref29","article-title":"7 series FPGA configurable logic block","year":"2014","journal-title":"Tech Rep uG474 (v1 7)"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"NTRU: A ring-based public key cryptosystem","author":"hoffstein","year":"1998","journal-title":"Algorithmic Number Theory"},{"key":"ref8","article-title":"Accelerating fully homomorphic encryption over the integers with super-size hardware multiplier and modular reduction","volume":"2013","author":"cao","year":"2013","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref7","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","author":"gentry","year":"2013","journal-title":"Advances in Cryptology"},{"key":"ref2","article-title":"HElib-an implementation of homomorphic encryption","author":"halevi","year":"2014"},{"key":"ref9","article-title":"Accelerating somewhat homomorphic evaluation using FPGAs","volume":"2015","author":"\u00f6zt\u00fcrk","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref1","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit","author":"gentry","year":"2012","journal-title":"Advances in Cryptology"},{"key":"ref20","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption","author":"lindner","year":"2011","journal-title":"Proc Cryptographers Track RSA Conf"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1561\/0400000074"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1112\/S1461157016000371"},{"key":"ref44","first-page":"223","author":"paillier","year":"1999","journal-title":"Public-key cryptosystems based on composite degree residuosity classes"},{"key":"ref26","volume":"1","author":"rabiner","year":"1975","journal-title":"Theory and Application of Digital Signal Processing"},{"key":"ref43","first-page":"10","author":"elgamal","year":"1985","journal-title":"A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms"},{"key":"ref25","first-page":"311","article-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor","volume":"86","author":"barrett","year":"1986","journal-title":"Proc Advances Cryptology"}],"container-title":["IEEE Transactions on Emerging Topics in Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245516\/7938807\/07604133.pdf?arnumber=7604133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:40:35Z","timestamp":1641987635000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7604133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,1]]},"references-count":44,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tetc.2016.2619669","relation":{},"ISSN":["2168-6750"],"issn-type":[{"value":"2168-6750","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,1]]}}}