{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:40:07Z","timestamp":1750189207070,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,6]],"date-time":"2022-06-06T00:00:00Z","timestamp":1654473600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information & Communications Technology Planning & Evaluation","award":["2020-0-00840"],"award-info":[{"award-number":["2020-0-00840"]}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2105373"],"award-info":[{"award-number":["2105373"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,6]]},"DOI":"10.1145\/3526241.3530338","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T14:37:09Z","timestamp":1654180629000},"page":"405-410","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["HELPSE: Homomorphic Encryption-based Lightweight Password Strength Estimation in a Virtual Keyboard System"],"prefix":"10.1145","author":[{"given":"Michael","family":"Cho","sequence":"first","affiliation":[{"name":"University of Washington Bothell, Bothell, WA, USA"}]},{"given":"Keewoo","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Sunwoong","family":"Kim","sequence":"additional","affiliation":[{"name":"University of Washington Bothell, Bothell, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_2_1","volume-title":"Microsoft Research","author":"Chen Hao","year":"2017","unstructured":"Hao Chen , Kyoohyung Han , Zhicong Huang , Amir Jalali , and Kim Laine . 2017 . Simple encrypted arithmetic library v2. 3.0 . Microsoft Research , December (2017). Hao Chen, Kyoohyung Han, Zhicong Huang, Amir Jalali, and Kim Laine. 2017. Simple encrypted arithmetic library v2. 3.0. Microsoft Research, December (2017)."},{"key":"e_1_3_2_1_3_1","volume-title":"Wei Dai, Nicolas Gama, Mariya Georgieva, Shai Halevi, Miran Kim, Sunwoong Kim, Kim Laine, et al.","author":"Cheon Jung Hee","year":"2021","unstructured":"Jung Hee Cheon , Anamaria Costache , Radames Cruz Moreno , Wei Dai, Nicolas Gama, Mariya Georgieva, Shai Halevi, Miran Kim, Sunwoong Kim, Kim Laine, et al. 2021 . Introduction to Homomorphic Encryption and Schemes. In Protecting Privacy through Homomorphic Encryption. Springer , 3--28. Jung Hee Cheon, Anamaria Costache, Radames Cruz Moreno, Wei Dai, Nicolas Gama, Mariya Georgieva, Shai Halevi, Miran Kim, Sunwoong Kim, Kim Laine, et al. 2021. Introduction to Homomorphic Encryption and Schemes. In Protecting Privacy through Homomorphic Encryption. Springer, 3--28."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_8_1","unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999).  Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999)."},{"volume-title":"Resist hacks by using Dashlane's password generator tool. Retrieved","year":"2020","key":"e_1_3_2_1_9_1","unstructured":"Dashlane. 2021. Resist hacks by using Dashlane's password generator tool. Retrieved January 4, 2020 from https:\/\/www.dashlane.com\/features\/password-generator Dashlane. 2021. Resist hacks by using Dashlane's password generator tool. Retrieved January 4, 2020 from https:\/\/www.dashlane.com\/features\/password-generator"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"e_1_3_2_1_11_1","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat practical fully homomorphic encryption . IACR Cryptol. ePrint Arch. 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_12_1","volume-title":"Examples of a Strong Password. Retrieved","author":"Gil Paul","year":"2020","unstructured":"Paul Gil . 2021. Examples of a Strong Password. Retrieved January 4, 2020 from https:\/\/www.lifewire.com\/strong-password-examples-2483118 Paul Gil. 2021. Examples of a Strong Password. Retrieved January 4, 2020 from https:\/\/www.lifewire.com\/strong-password-examples-2483118"},{"key":"e_1_3_2_1_13_1","volume-title":"International conference on machine learning. PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International conference on machine learning. PMLR, 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning. PMLR, 201--210."},{"volume-title":"Applications of division by convergence. Ph. D. Dissertation","author":"Goldschmidt Robert E","key":"e_1_3_2_1_14_1","unstructured":"Robert E Goldschmidt . 1964. Applications of division by convergence. Ph. D. Dissertation . Massachusetts Institute of Technology . Robert E Goldschmidt. 1964. Applications of division by convergence. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_15_1","volume-title":"LPSE: lightweight password-strength estimation for password meters. computers & security 73","author":"Guo Yimin","year":"2018","unstructured":"Yimin Guo and Zhenfeng Zhang . 2018. LPSE: lightweight password-strength estimation for password meters. computers & security 73 ( 2018 ), 507--518. Yimin Guo and Zhenfeng Zhang. 2018. LPSE: lightweight password-strength estimation for password meters. computers & security 73 (2018), 507--518."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3240508.3240620"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTCSA52859.2021.00016"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00033"},{"key":"e_1_3_2_1_19_1","volume-title":"FPGA-based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption. In 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1--8.","author":"Kim Sunwoong","year":"2019","unstructured":"Sunwoong Kim , Keewoo Lee , Wonhee Cho , Jung Hee Cheon , and Rob A Rutenbar . 2019 . FPGA-based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption. In 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1--8. Sunwoong Kim, Keewoo Lee, Wonhee Cho, Jung Hee Cheon, and Rob A Rutenbar. 2019. FPGA-based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption. In 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1--8."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"e_1_3_2_1_21_1","unstructured":"Edward A Lee Sanjit A Seshia etal 2011. Introduction to embedded systems. A Cyber-Physical Systems Approach 499 (2011).  Edward A Lee Sanjit A Seshia et al. 2011. Introduction to embedded systems. A Cyber-Physical Systems Approach 499 (2011)."},{"volume-title":"to be published. Virtual Keyboards with Real-time and Robust Deep Learning-based Gesture Recognition","author":"Lee Tae-Ho","key":"e_1_3_2_1_22_1","unstructured":"Tae-Ho Lee , Sunwoong Kim , Taehyun Kim , Jin-Sung Kim , and Hyuk-Jae Lee . to be published. Virtual Keyboards with Real-time and Robust Deep Learning-based Gesture Recognition . IEEE Transactions on Human-Machine Systems ( to be published). Tae-Ho Lee, Sunwoong Kim, Taehyun Kim, Jin-Sung Kim, and Hyuk-Jae Lee. to be published. Virtual Keyboards with Real-time and Robust Deep Learning-based Gesture Recognition. IEEE Transactions on Human-Machine Systems (to be published)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_25_1","volume-title":"Retrieved","author":"Treffiletti Danilo","year":"2014","unstructured":"Danilo Treffiletti . 2014 . Aes256 . Retrieved February 10, 2022 from https:\/\/github.com\/Urban82\/Aes256 Danilo Treffiletti. 2014. Aes256. Retrieved February 10, 2022 from https:\/\/github.com\/Urban82\/Aes256"}],"event":{"name":"GLSVLSI '22: Great Lakes Symposium on VLSI 2022","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Irvine CA USA","acronym":"GLSVLSI '22"},"container-title":["Proceedings of the Great Lakes Symposium on VLSI 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3526241.3530338","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530338","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3526241.3530338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:16Z","timestamp":1750186936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3526241.3530338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,6]]},"references-count":25,"alternative-id":["10.1145\/3526241.3530338","10.1145\/3526241"],"URL":"https:\/\/doi.org\/10.1145\/3526241.3530338","relation":{},"subject":[],"published":{"date-parts":[[2022,6,6]]},"assertion":[{"value":"2022-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}