{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T09:06:56Z","timestamp":1726045616759},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012492","name":"Youth Innovation Promotion Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012492","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/hpca56546.2023.10070984","type":"proceedings-article","created":{"date-parts":[[2023,3,24]],"date-time":"2023-03-24T17:42:55Z","timestamp":1679679775000},"page":"870-881","source":"Crossref","is-referenced-by-count":14,"title":["Poseidon: Practical Homomorphic Encryption Accelerator"],"prefix":"10.1109","author":[{"given":"Yinghao","family":"Yang","sequence":"first","affiliation":[{"name":"CAS,State Key Laboratory of Computer Architecture, Institute of Computing Technology,Beijing,China"}]},{"given":"Huaizhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"CAS,State Key Laboratory of Computer Architecture, Institute of Computing Technology,Beijing,China"}]},{"given":"Shengyu","family":"Fan","sequence":"additional","affiliation":[{"name":"CAS,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China"}]},{"given":"Hang","family":"Lu","sequence":"additional","affiliation":[{"name":"CAS,State Key Laboratory of Computer Architecture, Institute of Computing Technology,Beijing,China"}]},{"given":"Mingzhe","family":"Zhang","sequence":"additional","affiliation":[{"name":"CAS,State Key Laboratory of Information Security, Institute of Information Engineering,Beijing,China"}]},{"given":"Xiaowei","family":"Li","sequence":"additional","affiliation":[{"name":"CAS,State Key Laboratory of Computer Architecture, Institute of Computing Technology,Beijing,China"}]}],"member":"263","reference":[{"article-title":"Vitis rev:2021.1","key":"ref1"},{"article-title":"Vivado rev:2021.1","key":"ref2"},{"article-title":"Xilinxruntime rev:2021.1","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-319-29172-7_10"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.46586\/tches.v2018.i2.70-95"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2633600"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TC.2015.2498606"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-662-44774-1_14"},{"key":"ref9","article-title":"Accelerating fully homomorphic encryption over the integers with super-size hardware multiplier and modular reduction","author":"Cao","year":"2013","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3133956.3134061"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-319-70694-8_15"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-662-53887-6_1"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-29172-7_11"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/DSD.2013.108"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TC.2014.2345388"},{"key":"ref17","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1609\/aaai.v33i01.33019466"},{"volume-title":"Guide to elliptic curve cryptography","year":"2006","author":"Hankerson","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"ref22","article-title":"Homomorphic processing unit (hpu) for accelerating secure computations under homomorphic encryption","volume-title":"uS Patent","author":"Khedr","year":"2019"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MICRO56248.2022.00086"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3470496.3527415"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ReConFig48160.2019.8994793"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/FCCM48280.2020.00017"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/ACCESS.2022.3159694"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ACCESS.2022.3159694"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-030-77870-5_22"},{"volume-title":"WAHC 2020\u20138th Workshop on Encrypted Computing & Applied Homomorphic Cryptography","author":"Mouchet","article-title":"Lattigo: A multiparty homomorphic encryption library in go","key":"ref30"},{"article-title":"Nufhe, a gpu-powered torus fhe implementation","key":"ref31"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/3373376.3378523"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TC.2018.2816640"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/HPCA.2019.00052"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3466752.3480070"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3470496.3527393"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/SP40001.2021.00098"},{"article-title":"Cuda-accelerated fully homomorphic encryption library","key":"ref38"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/ISCAS.2014.6865755"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TC.2013.154"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TVLSI.2013.2281786"},{"article-title":"Product brief of smartssd","key":"ref42"}],"event":{"name":"2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)","start":{"date-parts":[[2023,2,25]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2023,3,1]]}},"container-title":["2023 IEEE International Symposium on High-Performance Computer Architecture (HPCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10070856\/10070923\/10070984.pdf?arnumber=10070984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T06:34:02Z","timestamp":1709447642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10070984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/hpca56546.2023.10070984","relation":{},"subject":[],"published":{"date-parts":[[2023,2]]}}}