{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:05Z","timestamp":1750309505405,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T00:00:00Z","timestamp":1737331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62176206"],"award-info":[{"award-number":["62176206"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,20]]},"DOI":"10.1145\/3658617.3697775","type":"proceedings-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T14:32:21Z","timestamp":1741098741000},"page":"1302-1307","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Low Multiplicative Depth Polynomial Evaluation Architectures for Homomorphic Encrypted Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0132-3319","authenticated-orcid":false,"given":"Jianfei","family":"Wang","sequence":"first","affiliation":[{"name":"Xi'an Jiaotong Univ., Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5744-5429","authenticated-orcid":false,"given":"Jia","family":"Hou","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong Univ., Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9711-0549","authenticated-orcid":false,"given":"Fahong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong Univ., Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3402-6386","authenticated-orcid":false,"given":"Yishuo","family":"Meng","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong Univ., Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3619-7936","authenticated-orcid":false,"given":"Yang","family":"Su","sequence":"additional","affiliation":[{"name":"Engineering Univ. of People's Armed Police, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8221-7670","authenticated-orcid":false,"given":"Chen","family":"Yang","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong Univ., Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"volume-title":"Advances in Cryptology --- CRYPTO' 86","author":"Barrett Paul","key":"e_1_3_2_1_1_1","unstructured":"Paul Barrett. 1987. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In Advances in Cryptology --- CRYPTO' 86. Springer Berlin Heidelberg, Berlin, Heidelberg, 311--323."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_4_1","volume-title":"Selected Areas in Cryptography-SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2019. A full RNS variant of approximate homomorphic encryption. In Selected Areas in Cryptography-SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17, 2018, Revised Selected Papers 25. Springer, 347--368."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"e_1_3_2_1_6_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_7_1","volume-title":"Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_1_8_1","volume-title":"Efficient cnn building blocks for encrypted data. arXiv preprint arXiv:2102.00319","author":"Jain Nayna","year":"2021","unstructured":"Nayna Jain, Karthik Nandakumar, Nalini Ratha, Sharath Pankanti, and Uttam Kumar. 2021. Efficient cnn building blocks for encrypted data. arXiv preprint arXiv:2102.00319 (2021)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3263631"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Miran Kim Yongsoo Song Shuang Wang Yuhou Xia Xiaoqian Jiang et al. 2018. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR medical informatics 6 2 (2018) e8805.","DOI":"10.2196\/medinform.8805"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3105111"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Joon-Woo Lee HyungChul Kang Yongwoo Lee Woosuk Choi Jieun Eom Maxim Deryabin Eunsang Lee Junghyun Lee Donghoon Yoo Young-Sik Kim et al. 2022. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. iEEE Access 10 (2022) 30039--30054.","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3219049"},{"key":"e_1_3_2_1_15_1","volume-title":"Min Luo, and Kim-Kwang Raymond Choo.","author":"Qin Hong","year":"2023","unstructured":"Hong Qin, Debiao He, Qi Feng, Muhammad Khurram Khan, Min Luo, and Kim-Kwang Raymond Choo. 2023. Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey. IEEE Transactions on Knowledge and Data Engineering (2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2023.154562"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3163970"}],"event":{"name":"ASPDAC '25: 30th Asia and South Pacific Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEICE","IPSJ","IEEE CAS","IEEE CEDA"],"location":"Tokyo Japan","acronym":"ASPDAC '25"},"container-title":["Proceedings of the 30th Asia and South Pacific Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658617.3697775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658617.3697775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:53Z","timestamp":1750295873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658617.3697775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,20]]},"references-count":17,"alternative-id":["10.1145\/3658617.3697775","10.1145\/3658617"],"URL":"https:\/\/doi.org\/10.1145\/3658617.3697775","relation":{},"subject":[],"published":{"date-parts":[[2025,1,20]]},"assertion":[{"value":"2025-03-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}