{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:58:57Z","timestamp":1740103137218,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,25]]},"DOI":"10.23919\/date58400.2024.10546534","type":"proceedings-article","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T17:28:02Z","timestamp":1723656482000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Ciphertext Management for Faster Fully Homomorphic Encryption Computation"],"prefix":"10.23919","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1938-912X","authenticated-orcid":false,"given":"Eduardo","family":"Chielle","sequence":"first","affiliation":[{"name":"New York University,Abu Dhabi"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5131-9044","authenticated-orcid":false,"given":"Oleg","family":"Mazonka","sequence":"additional","affiliation":[{"name":"New York University,Abu Dhabi"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6899-0651","authenticated-orcid":false,"given":"Michail","family":"Maniatakos","sequence":"additional","affiliation":[{"name":"New York University,Abu Dhabi"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Spectre Attacks: Exploiting Speculative Execution","author":"Kocher","year":"2018","journal-title":"preprint"},{"key":"ref2","article-title":"Meltdown","author":"Lipp","year":"2018","journal-title":"preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00089"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref6","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"volume-title":"Microsoft SEAL (release 3.7)","year":"2021","key":"ref9"},{"key":"ref10","article-title":"Design and implementation of helib: a homo-morphic encryption library","author":"Halevi","year":"2020","journal-title":"Cryptology ePrint Archive, Paper 2020\/1481"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1145\/3338469.3358945","article-title":"Ramparts: A programmer-friendly system for building homomorphic encryption applications","author":"Archer","year":"2019","journal-title":"WAHC"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00286"},{"key":"ref14","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","author":"Gilad-Bachrach","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref15","first-page":"812","article-title":"Low latency privacy pre-serving inference","volume":"97","author":"Brutzkus","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref17","first-page":"7102","article-title":"Hemet: A homomorphic-encryption-friendly privacy-preserving mobile neural network architecture","volume":"139","author":"Lou","year":"2021","journal-title":"International Conference on Machine Learning"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-28481-8"},{"key":"ref19","article-title":"ImageNet: A Large-Scale Hierarchical Image Database","author":"Deng","year":"2009","journal-title":"CVP R09"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"}],"event":{"name":"2024 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)","start":{"date-parts":[[2024,3,25]]},"location":"Valencia, Spain","end":{"date-parts":[[2024,3,27]]}},"container-title":["2024 Design, Automation &amp;amp; Test in Europe Conference &amp;amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10546498\/10546499\/10546534.pdf?arnumber=10546534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T04:28:44Z","timestamp":1723696124000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10546534\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.23919\/date58400.2024.10546534","relation":{},"subject":[],"published":{"date-parts":[[2024,3,25]]}}}