{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T14:12:38Z","timestamp":1775830358419,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,19]]},"DOI":"10.1145\/3704522.3704546","type":"proceedings-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:29:51Z","timestamp":1735907391000},"page":"16-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Benchmarking Fully Homomorphic Encryption Libraries in IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0203-6661","authenticated-orcid":false,"given":"Taimur","family":"Rahman","sequence":"first","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-1162-8417","authenticated-orcid":false,"given":"Anas Mohammad Ishfaqul Muktadir","family":"Osmani","sequence":"additional","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9385-4053","authenticated-orcid":false,"given":"Mohammad Shahriar","family":"Rahman","sequence":"additional","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3183-6420","authenticated-orcid":false,"given":"Mir Moynuddin Ahmed","family":"Shibly","sequence":"additional","affiliation":[{"name":"United International University, Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7262-0060","authenticated-orcid":false,"given":"Salekul","family":"Islam","sequence":"additional","affiliation":[{"name":"North South University, Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2019. Raspberry Pi 4 Model B Specifications. https:\/\/www.raspberrypi.com\/products\/raspberry-pi-4-model-b\/specifications\/."},{"key":"e_1_3_3_2_3_2","unstructured":"2022. Marshal and Unmarshal Binary Formats in Go. https:\/\/github.com\/encodingx\/binary."},{"key":"e_1_3_3_2_4_2","unstructured":"2023. Lattigo v5. Online: https:\/\/github.com\/tuneinsight\/lattigo. EPFL-LDS Tune Insight SA."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"crossref","unstructured":"Ghaida Alqarawi Bashayer Alkhalifah Najla Alharbi and Salim El\u00a0Khediri. 2023. Internet-of-things security and vulnerabilities: case study. Journal of Applied Security Research 18 3 (2023) 559\u2013575.","DOI":"10.1080\/19361610.2022.2031841"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Bernstein and Tanja Lange. 2017. Post-quantum cryptography. Nature 549 7671 (2017) 188\u2013194.","DOI":"10.1038\/nature23461"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Jean-Philippe Bossuat Rosario Cammarota Jung\u00a0Hee Cheon Ilaria Chillotti Benjamin\u00a0R Curtis Wei Dai Huijing Gong Erin Hales Duhyeong Kim Bryan Kumara et\u00a0al. 2024. Security Guidelines for Implementing Homomorphic Encryption. Cryptology ePrint Archive (2024).","DOI":"10.62056\/anxra69p1"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski Craig Gentry and Vinod Vaikuntanathan. 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT) 6 3 (2014) 1\u201336.","DOI":"10.1145\/2633600"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_16"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Nicolas Gama Mariya Georgieva and Malika Izabach\u00e8ne. 2020. TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology 33 1 (2020) 34\u201391.","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_3_2_11_2","unstructured":"Ahmad Al\u00a0Badawi et. al. 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive Paper 2022\/915. https:\/\/eprint.iacr.org\/2022\/915 https:\/\/eprint.iacr.org\/2022\/915."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Warren Gay. 2018. vcgencmd. Advanced Raspberry Pi: Raspbian Linux and GPIO Integration (2018) 337\u2013347.","DOI":"10.1007\/978-1-4842-3948-3_18"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Robin Geelen and Frederik Vercauteren. 2023. Bootstrapping for BGV and BFV Revisited. Journal of Cryptology 36 2 (2023) 12.","DOI":"10.1007\/s00145-023-09454-6"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_3_2_15_2","unstructured":"Craig Gentry. 2021. A Decade (or so) of fully homomorphic encryption. https:\/\/www.youtube.com\/watch?v=487AjvFW1lk."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.23919\/DATE56975.2023.10136979"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Charles Gouert Dimitris Mouris and Nektarios\u00a0Georgios Tsoutsos. 2023. SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks. Proceedings on Privacy Enhancing Technologies 2023 3 (July 2023) 154\u2013172. 10.56553\/popets-2023-0075","DOI":"10.56553\/popets-2023-0075"},{"key":"e_1_3_3_2_18_2","unstructured":"Inferati Inc.2021. Introduction to the BFV FHE Scheme. (2021). https:\/\/www.inferati.com\/blog\/fhe-schemes-bfv"},{"key":"e_1_3_3_2_19_2","unstructured":"Inferati Inc.2022. Introduction to the BGV FHE Scheme. (2022). https:\/\/www.inferati.com\/blog\/fhe-schemes-bgv"},{"key":"e_1_3_3_2_20_2","unstructured":"Inferati Inc.2022. Introduction to the CKKS\/HEAAN FHE Scheme. (2022). https:\/\/www.inferati.com\/blog\/fhe-schemes-ckks"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Asma Jahangeer Sibghat\u00a0Ullah Bazai Saad Aslam Shah Marjan Muhammad Anas and Sayed\u00a0Habibullah Hashemi. 2023. A Review on the Security of IoT Networks: From Network Layer\u2019s Perspective. IEEE Access (2023).","DOI":"10.1109\/ACCESS.2023.3246180"},{"key":"e_1_3_3_2_22_2","unstructured":"Lei Jiang and Lei Ju. 2022. FHEBench: Benchmarking Fully Homomorphic Encryption Schemes. arxiv:https:\/\/arXiv.org\/abs\/2203.00728\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2203.00728"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_21"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Joon-Woo Lee HyungChul Kang Yongwoo Lee Woosuk Choi Jieun Eom Maxim Deryabin Eunsang Lee Junghyun Lee Donghoon Yoo Young-Sik Kim et\u00a0al. 2022. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. iEEE Access 10 (2022) 30039\u201330054.","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30620-4_8"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Goran \u0110or\u0111evi\u0107 Milan Markovi\u0107 and Pavle Vuleti\u0107. 2022. EVAULATION OF HOMOMORPHIC ENCRYPTION IMPLEMENTATION ON IOT DEVICE. Journal of Information Technology & Applications 12 1 (2022).","DOI":"10.7251\/JIT2201032DJ"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT54382.2022.10152214"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Iqbal\u00a0H Sarker Asif\u00a0Irshad Khan Yoosef\u00a0B Abushark and Fawaz Alsolami. 2023. Internet of things (iot) security intelligence: a comprehensive overview machine learning solutions and research directions. Mobile Networks and Applications 28 1 (2023) 296\u2013312.","DOI":"10.1007\/s11036-022-01937-3"},{"key":"e_1_3_3_2_29_2","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research Redmond WA.."},{"key":"e_1_3_3_2_30_2","unstructured":"Jonathan Takeshita Nirajan Koirala Colin McKechney and Taeho Jung. 2024. HEProfiler: An In-Depth Profiler of Approximate Homomorphic Encryption Libraries. Cryptology ePrint Archive Paper 2024\/1059. https:\/\/eprint.iacr.org\/2024\/1059"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Vishal\u00a0A Thakor Mohammad\u00a0Abdur Razzaque and Muhammad\u00a0RA Khandaker. 2021. Lightweight cryptography algorithms for resource-constrained IoT devices: A review comparison and research opportunities. IEEE Access 9 (2021) 28177\u201328193.","DOI":"10.1109\/ACCESS.2021.3052867"}],"event":{"name":"NSysS '24: 11th International Conference on Networking, Systems, and Security","location":"Khulna Karak Bangladesh","acronym":"NSysS '24"},"container-title":["Proceedings of the 11th International Conference on Networking, Systems, and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704546","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3704522.3704546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:16Z","timestamp":1750295896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3704522.3704546"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":30,"alternative-id":["10.1145\/3704522.3704546","10.1145\/3704522"],"URL":"https:\/\/doi.org\/10.1145\/3704522.3704546","relation":{},"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"2025-01-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}