{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:51:29Z","timestamp":1765961489088,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Junior Postdoctoral Fellowship from the Research Foundation ? Flanders (FWO)"},{"name":"CyberSecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,15]]},"DOI":"10.1145\/3474366.3486925","type":"proceedings-article","created":{"date-parts":[[2021,11,5]],"date-time":"2021-11-05T22:04:55Z","timestamp":1636149895000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Integer Functions Suitable for Homomorphic Encryption over Finite Fields"],"prefix":"10.1145","author":[{"given":"Ilia","family":"Iliashenko","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Christophe","family":"Negre","sequence":"additional","affiliation":[{"name":"Univ Perpignan Via Domitia &amp; LIRMM Univ Montpellier, Perpignan, France"}]},{"given":"Vincent","family":"Zucca","sequence":"additional","affiliation":[{"name":"Univ Perpignan Via Domitia &amp; LIRMM Univ Montpellier, Montpellier, France"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Hao\n      Chen Ilaria\n      Chillotti and \n      Yongsoo\n      Song\n    .\n  Improved bootstrapping for approximate homomorphic encryption\n  . In Yuval Ishai and Vincent Rijmen editors EUROCRYPT \n  2019 Part II volume \n  11477\n   of \n  LNCS pages \n  34\n  --\n  54\n  . \n  Springer Heidelberg May 2019.  Hao Chen Ilaria Chillotti and Yongsoo Song. Improved bootstrapping for approximate homomorphic encryption. In Yuval Ishai and Vincent Rijmen editors EUROCRYPT 2019 Part II volume 11477 of LNCS pages 34--54. Springer Heidelberg May 2019.","DOI":"10.1007\/978-3-030-17656-3_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Hao\n      Chen\n     and \n      Kyoohyung\n      Han\n    .\n  Homomorphic lower digits removal and improved FHE bootstrapping\n  . In Jesper Buus Nielsen and Vincent Rijmen editors EUROCRYPT \n  2018 Part I volume \n  10820\n   of \n  LNCS pages \n  315\n  --\n  337\n  . \n  Springer Heidelberg April \/ May 2018.  Hao Chen and Kyoohyung Han. Homomorphic lower digits removal and improved FHE bootstrapping. In Jesper Buus Nielsen and Vincent Rijmen editors EUROCRYPT 2018 Part I volume 10820 of LNCS pages 315--337. Springer Heidelberg April \/ May 2018.","DOI":"10.1007\/978-3-319-78381-9_12"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Jung Hee\n      Cheon Kyoohyung\n      Han Andrey\n      Kim Miran\n      Kim and \n      Yongsoo\n      Song\n    .\n  Bootstrapping for approximate homomorphic encryption\n  . In Jesper Buus Nielsen and Vincent Rijmen editors EUROCRYPT \n  2018 Part I volume \n  10820\n   of \n  LNCS pages \n  360\n  --\n  384\n  . \n  Springer Heidelberg April \/ May 2018.  Jung Hee Cheon Kyoohyung Han Andrey Kim Miran Kim and Yongsoo Song. Bootstrapping for approximate homomorphic encryption. In Jesper Buus Nielsen and Vincent Rijmen editors EUROCRYPT 2018 Part I volume 10820 of LNCS pages 360--384. Springer Heidelberg April \/ May 2018.","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jung Hee\n      Cheon Dongwoo\n      Kim Duhyeong\n      Kim Hun-Hee\n      Lee and \n      Keewoo\n      Lee\n    .\n  Numerical method for comparison on homomorphically encrypted numbers\n  . In Steven D. Galbraith and Shiho Moriai editors ASIACRYPT \n  2019 Part II volume \n  11922\n   of \n  LNCS pages \n  415\n  --\n  445\n  . \n  Springer Heidelberg December 2019.  Jung Hee Cheon Dongwoo Kim Duhyeong Kim Hun-Hee Lee and Keewoo Lee. Numerical method for comparison on homomorphically encrypted numbers. In Steven D. Galbraith and Shiho Moriai editors ASIACRYPT 2019 Part II volume 11922 of LNCS pages 415--445. Springer Heidelberg December 2019.","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ilaria\n      Chillotti Nicolas\n      Gama Mariya\n      Georgieva and \n      Malika\n      Izabach\u00e8ne\n    .\n  Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE\n  . In Tsuyoshi Takagi and Thomas Peyrin editors ASIACRYPT \n  2017 Part I volume \n  10624\n   of \n  LNCS pages \n  377\n  --\n  408\n  . \n  Springer Heidelberg December 2017.  Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. Faster packed homomorphic operations and efficient circuit bootstrapping for TFHE. In Tsuyoshi Takagi and Thomas Peyrin editors ASIACRYPT 2017 Part I volume 10624 of LNCS pages 377--408. Springer Heidelberg December 2017.","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"L\u00e9o\n      Ducas\n     and \n      Daniele\n      Micciancio\n    .\n  FHEW: Bootstrapping homomorphic encryption in less than a second\n  . In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT \n  2015 Part I volume \n  9056\n   of \n  LNCS pages \n  617\n  --\n  640\n  . \n  Springer Heidelberg April 2015.  L\u00e9o Ducas and Daniele Micciancio. FHEW: Bootstrapping homomorphic encryption in less than a second. In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT 2015 Part I volume 9056 of LNCS pages 617--640. Springer Heidelberg April 2015.","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Shai\n      Halevi\n     and \n      Victor\n      Shoup\n    .\n  Bootstrapping for HElib\n  . In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT \n  2015 Part I volume \n  9056\n   of \n  LNCS pages \n  641\n  --\n  670\n  . \n  Springer Heidelberg April 2015.  Shai Halevi and Victor Shoup. Bootstrapping for HElib. In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT 2015 Part I volume 9056 of LNCS pages 641--670. Springer Heidelberg April 2015.","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"e_1_3_2_1_14_1","first-page":"364","volume-title":"LNCS","author":"Han Kyoohyung","year":"2020","unstructured":"Kyoohyung Han and Dohyeong Ki . Better bootstrapping for approximate homomorphic encryption. In CT-RSA 2020 , LNCS , pages 364 -- 390 . Springer, Heidelberg , 2020 . Kyoohyung Han and Dohyeong Ki. Better bootstrapping for approximate homomorphic encryption. In CT-RSA 2020, LNCS, pages 364--390. Springer, Heidelberg, 2020."},{"issue":"3","key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","first-page":"246","DOI":"10.2478\/popets-2021-0046","article-title":"Faster homomorphic comparison operations for BGV and BFV","volume":"2021","author":"Iliashenko Ilia","year":"2021","unstructured":"Ilia Iliashenko and Vincent Zucca . Faster homomorphic comparison operations for BGV and BFV . PoPETs , 2021 ( 3 ): 246 -- 264 , 2021 . Ilia Iliashenko and Vincent Zucca. Faster homomorphic comparison operations for BGV and BFV. PoPETs, 2021(3):246--264, 2021.","journal-title":"PoPETs"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2018-0016"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/0202007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2967740"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 9th on Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474366.3486925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474366.3486925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:26Z","timestamp":1750188626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474366.3486925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":19,"alternative-id":["10.1145\/3474366.3486925","10.1145\/3474366"],"URL":"https:\/\/doi.org\/10.1145\/3474366.3486925","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}