{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:51:48Z","timestamp":1762455108182,"version":"build-2065373602"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.23919\/date64628.2025.10992915","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T13:36:35Z","timestamp":1747834595000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["FLASH: An Efficient Hardware Accelerator Leveraging Approximate and Sparse FFT for Homomorphic Encryption"],"prefix":"10.23919","author":[{"given":"Tengyu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Integrated Circuits, Peking University,Beijing,China"}]},{"given":"Yufei","family":"Xue","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology,Hong Kong SAR"}]},{"given":"Ling","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University,Beijing,China"}]},{"given":"Zhen","family":"Gu","sequence":"additional","affiliation":[{"name":"DAMO Academy,Alibaba Group,China"}]},{"given":"Yuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University,Beijing,China"}]},{"given":"Runsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University,Beijing,China"}]},{"given":"Ru","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University,Beijing,China"}]},{"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Artificial -Intelligence, Peking University,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Juvekar","year":"2018"},{"key":"ref2","first-page":"809","article-title":"Cheetah: Lean and fast secure Two-Party deep neural network inference","volume-title":"31st USENIX Security Symposium (USENIX Security22)","author":"Huang","year":"2022"},{"key":"ref3","article-title":"Bolt: Privacy-preserving, accurate and efficient inference for transformers","author":"Pang","year":"2023","journal-title":"Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.003"},{"key":"ref5","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"International conference on machine learning","author":"Gilad-Bachrach","year":"2016"},{"key":"ref6","first-page":"4490","article-title":"Tapas: Tricks to accelerate (encrypted) prediction as a service","volume-title":"International conference on machine learning","author":"Sanyal","year":"2018"},{"key":"ref7","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348170"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230057"},{"journal-title":"Cryptodl: Deep neural networks over encrypted data","year":"2017","author":"Hesamifard","key":"ref11"},{"volume-title":"A fully homomorphic encryption scheme","year":"2009","author":"Gentry","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2023.3292211"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071133"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247696"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2022.3205552"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465834"},{"key":"ref26","first-page":"1","article-title":"Understanding error propagation in deep learning neural network (dnn) accelerators and applications","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","author":"Li","year":"2017"},{"key":"ref27","first-page":"2505","article-title":"Delphi: A cryptographic inference service for neural networks","volume-title":"Proc. 29th USENIX Secur. Symp","author":"Srinivasan","year":"2019"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_22"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD57390.2023.10323744"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1145\/3566097.3567885","article-title":"Approximate floating-point fft design with wide precision-range and high energy efficiency","volume-title":"Proceedings of the 28th Asia and South Pacific Design Automation Conference","author":"Wen","year":"2023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/APCCAS55924.2022.10090295"},{"journal-title":"Hequant: Marrying homomorphic encryption and quantization for communication-efficient private inference","year":"2024","author":"Xu","key":"ref33"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/iolts59296.2023.10224872"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2018.8341970"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3316781.3317870","article-title":"Noise injection adaption: End-to-end reram crossbar non-ideal effect adaption for neural network mapping","volume-title":"Proceedings of the 56th Annual Design Automation Conference 2019","author":"He","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_24"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"ref39","first-page":"11875","article-title":"Hawq-v3: Dyadic neural network quantization","volume-title":"International Conference on Machine Learning","author":"Yao","year":"2021"},{"volume-title":"Microsoft SEAL (release 3.2)","year":"2019","key":"ref40"}],"event":{"name":"2025 Design, Automation &amp; Test in Europe Conference (DATE)","start":{"date-parts":[[2025,3,31]]},"location":"Lyon, France","end":{"date-parts":[[2025,4,2]]}},"container-title":["2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992638\/10992588\/10992915.pdf?arnumber=10992915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T18:47:35Z","timestamp":1762454855000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10992915\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/date64628.2025.10992915","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}