{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T11:06:48Z","timestamp":1768561608551,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100006602","name":"Defense Advanced Research Projects Agency and Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-11-C-0098"],"award-info":[{"award-number":["FA8750-11-C-0098"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/tifs.2016.2639340","type":"journal-article","created":{"date-parts":[[2016,12,13]],"date-time":"2016-12-13T19:24:16Z","timestamp":1481657056000},"page":"1031-1041","source":"Crossref","is-referenced-by-count":11,"title":["Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-5092","authenticated-orcid":false,"given":"Kurt","family":"Rohloff","sequence":"first","affiliation":[]},{"given":"David Bruce","family":"Cousins","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Sumorok","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Accelerating fully homomorphic encryption over the integers with super-size hardware multiplier and modular reduction","author":"cao","year":"2013"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1112\/S1461157016000371"},{"key":"ref31","first-page":"153","author":"albrecht","year":"2016","journal-title":"A Subfield Lattice Attack on Overstretched NTRU Assumptions"},{"key":"ref30","year":"2014","journal-title":"Amazon Instance Types"},{"key":"ref35","first-page":"1","article-title":"Practical bootstrapping in quasilinear time","volume":"8042","author":"alperin-sheriff","year":"2013","journal-title":"Adv Cryptology"},{"key":"ref34","article-title":"Accelerating somewhat homomorphic evaluation using FPGAs","author":"\u00f6zt\u00fcrk","year":"2015"},{"key":"ref10","first-page":"129","article-title":"Implementing gentry&#x2019;s fully-homomorphic encryption scheme","volume":"6632","author":"gentry","year":"2011","journal-title":"Adv Cryptology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref12","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","author":"gentry","year":"2013","journal-title":"Adv Cryptology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0095-1"},{"key":"ref15","author":"gentry","year":"2014","journal-title":"HElib"},{"key":"ref16","first-page":"617","article-title":"FHEW: Bootstrapping homomorphic encryption in less than a second","author":"ducas","year":"2015","journal-title":"Adv Cryptology"},{"key":"ref17","article-title":"Using homomorphic encryption for large scale statistical analysis","author":"wu","year":"2012"},{"key":"ref18","first-page":"3797","article-title":"An improved mu-law proportionate NLMS algorithm","author":"liu","year":"2008","journal-title":"Proc IEEE Int Conf Acoust Speech Signal Process (ICASSP)"},{"key":"ref19","first-page":"318","author":"lepoint","year":"2014","journal-title":"A Comparison of the Homomorphic Encryption Schemes FV and YASHE"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref4","first-page":"221","article-title":"A scalable implementation of fully homomorphic encryption built on NTRU","author":"rohloff","year":"2014","journal-title":"Proceedings of the 2nd Workshop on Applied Homomorphic Cryptography (WAHC)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139061407"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533069"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/BFb0054868","article-title":"NTRU: A ring-based public key cryptosystem","volume":"1423","author":"hoffstein","year":"1998","journal-title":"Algorithmic Number Theory"},{"key":"ref29","year":"2014","journal-title":"Ookla"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.87"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6189"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54833-8_2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3711"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45639-2_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1561\/0400000074"},{"key":"ref21","first-page":"35","article-title":"A toolkit for ring-lwe cryptography","volume":"7881","author":"lyubashevsky","year":"2013","journal-title":"Adv Cryptology"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_3"},{"key":"ref23","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit","author":"gentry","year":"2012","journal-title":"Adv Cryptology"},{"key":"ref26","first-page":"1","article-title":"BKZ 2.0: Better lattice security estimates","volume":"7073","author":"chen","year":"2011","journal-title":"Adv Cryptology"},{"key":"ref25","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption","author":"lindner","year":"2011","journal-title":"Topics in Cryptology&#x2014;CT-RSA"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7862329\/07782328.pdf?arnumber=7782328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:19:21Z","timestamp":1642004361000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7782328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":35,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2016.2639340","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5]]}}}