{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:05:02Z","timestamp":1747973102460,"version":"3.41.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.23919\/date64628.2025.10993051","type":"proceedings-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T17:36:35Z","timestamp":1747848995000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["UNIT: A Highly Unified and Memory-Efficient FPGA-Based Accelerator for Torus FHE"],"prefix":"10.23919","author":[{"given":"Yuying","family":"Zhang","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology"}]},{"given":"Sharad","family":"Sinha","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology (IIT) Goa"}]},{"given":"Jiang","family":"Xu","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/B978-0-12-396535-6.00002-8","article-title":"Cloud computing uncovered: A research landscape","volume":"86","author":"Hamdaqa","year":"2012","journal-title":"Advances in Computers"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref4","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive, Paper 2012\/144"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-70694-8_15","article-title":"Homomorphic encryption for arithmetic of approximate numbers","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"Cheon","year":"2017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3676955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623159"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1145\/3613424.3614264","article-title":"Strix: An end-to-end streaming architecture with two-level ciphertext batching for fully homomorphic encryption with programmable bootstrapping","volume-title":"Proceedings of the 56th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"Putra","year":"2023"},{"key":"ref15","article-title":"Concrete: Concrete operates on ciphertexts rapidly by extending tfhe","volume-title":"WAHC 2020\u20138th Workshop on Encrypted Computing & Applied Homomorphic Cryptography","author":"Chillotti","year":"2020"},{"volume-title":"TFHE-rs: A Pure Rust Implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data","year":"2022","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"volume-title":"Cuda-accelerated fully homo-morphic encryption library","year":"2019","author":"Gizem","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530435"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3338953"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00028"},{"key":"ref23","article-title":"An fpga-based programmable vector engine for fast fully homomorphic encryption over the torus","volume-title":"SPSL: Secure and Private Systems for Machine Learning (ISCA Workshop)","author":"Gener","year":"2021"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC55821.2022.9926381"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2024.3353374"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"volume-title":"A gpu implementation of fully homomorphic encryption on torus","year":"2020","author":"Bogdan","key":"ref28"}],"event":{"name":"2025 Design, Automation &amp; Test in Europe Conference (DATE)","start":{"date-parts":[[2025,3,31]]},"location":"Lyon, France","end":{"date-parts":[[2025,4,2]]}},"container-title":["2025 Design, Automation &amp;amp; Test in Europe Conference (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992638\/10992588\/10993051.pdf?arnumber=10993051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:35:26Z","timestamp":1747892126000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10993051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":28,"URL":"https:\/\/doi.org\/10.23919\/date64628.2025.10993051","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}