{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:45Z","timestamp":1740132045681,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2018YFB2202101"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61834002"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"National Science and Technology Major Project of the Ministry of Science and Technology of China","doi-asserted-by":"publisher","award":["2018ZX01027101-002"],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1109\/tcad.2021.3101410","type":"journal-article","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T20:28:14Z","timestamp":1627676894000},"page":"2024-2037","source":"Crossref","is-referenced-by-count":1,"title":["Efficient FHE Radix-2 Arithmetic Operations Based on Redundant Encoding"],"prefix":"10.1109","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6324-9749","authenticated-orcid":false,"given":"Zongsheng","family":"Hou","sequence":"first","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2063-1550","authenticated-orcid":false,"given":"Neng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"given":"Bohan","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1117-2740","authenticated-orcid":false,"given":"Hanning","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"given":"Min","family":"Zhu","sequence":"additional","affiliation":[{"name":"Wuxi Micro Innovation Integrated Circuit Design Company Ltd., Wuxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2309-572X","authenticated-orcid":false,"given":"Shouyi","family":"Yin","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5117-7920","authenticated-orcid":false,"given":"Shaojun","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7548-4116","authenticated-orcid":false,"given":"Leibo","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute of Microelectronics, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2816343"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2780885"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2695487"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-6393-1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref9","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume-title":"Proc. IACR Cryptol. ePrint Arch.","volume":"2012","author":"Fan"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref14","first-page":"430","article-title":"Improving TFHE: Faster packed homomorphic operations and efficient circuit bootstrapping","volume-title":"Proc. IACR Cryptol. ePrint Arch.","author":"Chillotti"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_3"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3031266"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.197"},{"key":"ref21","first-page":"1116","article-title":"Secure hash algorithm","volume-title":"Cryptography Network Security Principles Practice","author":"Stallings","year":"1999"},{"article-title":"ChaCha, a variant of Salsa20","volume-title":"Proc. Workshop Record SASC State Art Stream Ciphers","author":"Bernstein","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2483486"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2019-0026"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00043"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EDSSC.2019.8753931"},{"key":"ref27","first-page":"201","article-title":"CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref28","first-page":"12","volume-title":"Design and Implementation of a Homomorphic-Encryption Library","author":"Halevi","year":"2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2906047"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1961.5219227"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/12.46283"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2006.379838"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/322217.322232"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023255"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"volume-title":"Secure Hash Standard (SHS)","year":"2012","key":"ref38"},{"article-title":"Secrecy, authentication, and public key systems","year":"1979","author":"Merkle","key":"ref39"},{"volume-title":"NTL: Library for Doing Number Theory","year":"2001","key":"ref40"},{"volume-title":"PALISADE Lattice Cryptography Library (Release 1.11.2)","year":"2021","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346877"},{"volume-title":"Homomorphically Encrypted Arithmetic Operations Over the Integer Ring","year":"2016","author":"Chen","key":"ref43"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9799721\/09502150.pdf?arnumber=9502150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T22:38:19Z","timestamp":1705012699000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9502150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":43,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2021.3101410","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2022,7]]}}}