{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:55:47Z","timestamp":1775620547642,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176206"],"award-info":[{"award-number":["62176206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2020Z066070001"],"award-info":[{"award-number":["2020Z066070001"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. VLSI Syst."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tvlsi.2023.3277865","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:45:47Z","timestamp":1686159947000},"page":"1153-1166","source":"Crossref","is-referenced-by-count":11,"title":["TCPM: A Reconfigurable and Efficient Toom-Cook-Based Polynomial Multiplier Over Rings Using a Novel Compressed Postprocessing Algorithm"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0132-3319","authenticated-orcid":false,"given":"Jianfei","family":"Wang","sequence":"first","affiliation":[{"name":"School of Microelectronics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8221-7670","authenticated-orcid":false,"given":"Chen","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"given":"Fahong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"given":"Yishuo","family":"Meng","sequence":"additional","affiliation":[{"name":"School of Microelectronics, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3619-7936","authenticated-orcid":false,"given":"Yang","family":"Su","sequence":"additional","affiliation":[{"name":"School of Cryptography Engineering, Engineering University of People&#x2019;s Armed Police, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89339-6_16"},{"key":"ref35","first-page":"311","article-title":"Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor","author":"barrett","year":"2000","journal-title":"Proc Conf Theory Appl Cryptographic Techn"},{"key":"ref12","first-page":"1","article-title":"NTRU prime","author":"bernstein","year":"2019","journal-title":"Proc 2nd PQC Std Conf"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/TC.2016.2574340","article-title":"A custom accelerator for homomorphic encryption applications","volume":"66","author":"dor\u00f6z","year":"2017","journal-title":"IEEE Trans Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i2.222-244"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2011.6035000"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i3.243-266"},{"key":"ref36","author":"hankerson","year":"2006","journal-title":"Guide to Elliptic Curve Cryptography"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"ref30","first-page":"238","article-title":"F1: A fast and programmable accelerator for fully homomorphic encryption","author":"feldmann","year":"2021","journal-title":"Proc 54th Annual IEEE\/ACM MICRO"},{"key":"ref11","first-page":"1","article-title":"Hardware challenges in post-quantum encryption and fully homomorphic encryption","author":"roy","year":"2022","journal-title":"IEEE Int Solid-State Circuits Conf (ISSCC) Dig Tech Papers"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2816640"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1969-0249212-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CICC53496.2022.9772859"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3222954"},{"key":"ref16","first-page":"1","article-title":"Compact domain-specific co-processor for accelerating module lattice-based KEM","author":"mera","year":"2020","journal-title":"Proc 57th ACM\/IEEE Design Autom Conf (DAC)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2019.8662528"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3191111"},{"key":"ref18","first-page":"281","article-title":"Faster multiplication in Z2 m [x] on Cortex-M4 to speed up NIST PQC candidates","author":"kannwischer","year":"2019","journal-title":"Proc 17th Int Conf ACNS"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2020.i4.443-466"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC53464.2021.00024"},{"key":"ref26","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref20","article-title":"Design exploration and code optimizations for FPGA-based post-quantum cryptography using high-level synthesis","author":"guerrieri","year":"2022","journal-title":"TechRxiv"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2020.3048395"},{"key":"ref21","first-page":"514","article-title":"A 28 nm 48 KOPS 3.4 ?J\/Op agile crypto-processor for post-quantum cryptography on multi-mathematical problems","author":"zhu","year":"2022","journal-title":"IEEE Int Solid-State Circuits Conf (ISSCC) Dig Tech Papers"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3163970"},{"key":"ref8","first-page":"595","article-title":"Multiplication of multidigit numbers on automata","volume":"7","author":"karatsuba","year":"1963","journal-title":"Sov Phys Doklady"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref9","first-page":"714","article-title":"The complexity of a scheme of functional elements realizing the multiplication of integers","volume":"3","author":"toom","year":"1963","journal-title":"Soviet Math Doklady"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref3","first-page":"1","article-title":"FALCON: Fast-Fourier Lattice-based compact signatures over NTRU","volume":"36","author":"fouque","year":"2018","journal-title":"NIST&#x2019;s Post-Quantum Cryptogr Standardization Process"},{"key":"ref6","first-page":"1","article-title":"TFHE: Fast fully homomorphic encryption over the torus","volume":"33","author":"chillotti","year":"2019","journal-title":"J Cryptol"},{"key":"ref5","first-page":"505","article-title":"Research on homomorphic encryption for arithmetic of approximate numbers","author":"dharani","year":"2023","journal-title":"Proc Int Conf Intell Syst Commun IoT Secur (ICISCoIS)"}],"container-title":["IEEE Transactions on Very Large Scale Integration (VLSI) Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/92\/10194475\/10145486.pdf?arnumber=10145486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T18:08:43Z","timestamp":1692036523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10145486\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":39,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tvlsi.2023.3277865","relation":{},"ISSN":["1063-8210","1557-9999"],"issn-type":[{"value":"1063-8210","type":"print"},{"value":"1557-9999","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}