{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:50:39Z","timestamp":1770540639333,"version":"3.49.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100007637","name":"Departamento Administrativo de Ciencia, Tecnolog\u00eda e Innovaci\u00f3n","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007637","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/tvlsi.2017.2697841","type":"journal-article","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T18:32:56Z","timestamp":1494959576000},"page":"2332-2345","source":"Crossref","is-referenced-by-count":60,"title":["High-Throughput Ring-LWE Cryptoprocessors"],"prefix":"10.1109","volume":"25","author":[{"given":"Claudia Patricia","family":"Renteria-Mejia","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4091-1055","authenticated-orcid":false,"given":"Jaime","family":"Velasco-Medina","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_11"},{"key":"ref31","article-title":"Recommendation for random bit generator (RBG) constructions","author":"barker","year":"2012"},{"key":"ref30","first-page":"1","article-title":"Towards efficient discrete Gaussian sampling for lattice-based cryptography","author":"du","year":"2015","journal-title":"Proc Int Conf Field Program Logic Appl (FPL)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_20"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2014.2350431"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_8"},{"key":"ref12","first-page":"164","article-title":"Modular hardware architecture for somewhat homomorphic function evaluation","author":"roy","year":"2015","journal-title":"Proc Workshop Cryptographic Hardw Embedded Syst (CHES)"},{"key":"ref13","article-title":"Accelerating somewhat homomorphic evaluation using FPGAs","author":"\u00f6zt\u00fcrk","year":"2015"},{"key":"ref14","article-title":"Post-quantum key exchange&#x2014;A new hope","author":"alkim","year":"2015"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978425"},{"key":"ref16","first-page":"383","article-title":"High precision discrete Gaussian sampling on FPGAs","author":"roy","year":"2014","journal-title":"Proc 20th Int Conf Sel Areas Cryptogr (SAC)"},{"key":"ref17","first-page":"319","article-title":"Better key sizes (and attacks) for LWE-based encryption","author":"lindner","year":"2011","journal-title":"Proc Cryptographers Track-RSA Conf (CT-RSA)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1039488.1039490"},{"key":"ref28","article-title":"Implementing the radix-4 decimation in frequency (DIF) fast Fourier transform (FFT) algorithm using a TMS320C80 DSP","author":"wu","year":"1998"},{"key":"ref4","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","author":"lyubashevsky","year":"2010","journal-title":"Proc 24th Annu Int Conf Theory Appl Cryptogr Techn (EUROCRYPT)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.09.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref6","first-page":"68","article-title":"Towards practical lattice-based public-key encryption on reconfigurable hardware","author":"p\u00f6ppelmann","year":"2013","journal-title":"Proc 20th Int Conf Sel Areas Cryptogr (SAC)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2478\/tmmp-2014-0022"},{"key":"ref5","first-page":"512","article-title":"On the design of hardware building blocks for modern lattice-based encryption schemes","author":"g\u00f6ttert","year":"2012","journal-title":"Proc 4th Int Workshop Cryptographic Hardw Embedded Syst (CHES)"},{"key":"ref8","article-title":"Lattice-based cryptography","author":"van de pol","year":"2011"},{"key":"ref7","first-page":"371","article-title":"Compact ring-LWE cryptoprocessor","author":"roy","year":"2014","journal-title":"Proc 9th Int Workshop Cryptograph Hardw Embed Syst (CHES)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2014.7002209"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374406"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2013.862237"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"ref24","first-page":"139","article-title":"Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware","author":"p\u00f6ppelmann","year":"2012","journal-title":"Proc 2nd IEEE Int Conf Ind Info"},{"key":"ref23","first-page":"663","article-title":"Efficient ring-LWE encryption on 8-bit AVR processors","author":"liu","year":"2015","journal-title":"Proc Workshop Cryptographic Hardw Embedded Syst (CHES)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/78.752621"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2015.2495724"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/7990278\/07929413.pdf?arnumber=7929413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:14Z","timestamp":1642003394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7929413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":35,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2017.2697841","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}