{"id":"https://openalex.org/W2951880831","doi":"https://doi.org/10.1109/hst.2019.8741036","title":"CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution","display_name":"CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution","publication_year":2019,"publication_date":"2019-05-01","ids":{"openalex":"https://openalex.org/W2951880831","doi":"https://doi.org/10.1109/hst.2019.8741036","mag":"2951880831"},"language":"en","primary_location":{"id":"doi:10.1109/hst.2019.8741036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2019.8741036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110703612","display_name":"Mohammed Nabeel","orcid":null},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mohammed Nabeel","raw_affiliation_strings":["Center for Cyber Security, New York University, Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, Abu Dhabi","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076080488","display_name":"Mohammed Ashraf","orcid":"https://orcid.org/0000-0002-1256-7229"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammed Ashraf","raw_affiliation_strings":["Center for Cyber Security, New York University, Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, Abu Dhabi","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["Center for Cyber Security, New York University, Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, Abu Dhabi","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064496184","display_name":"Nektarios Georgios Tsoutsos","orcid":"https://orcid.org/0000-0002-5769-0124"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nektarios G. Tsoutsos","raw_affiliation_strings":["Electrical and Computer Engineering Department, University of Delaware"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, University of Delaware","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Center for Cyber Security, New York University, Abu Dhabi"],"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, Abu Dhabi","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110703612"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.74438967,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"131","last_page":"140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8051724433898926},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.6355865001678467},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6304792165756226},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6105677485466003},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5917776226997375},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5790066719055176},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.4534750282764435},{"id":"https://openalex.org/keywords/processor-design","display_name":"Processor design","score":0.44168993830680847},{"id":"https://openalex.org/keywords/universal-asynchronous-receiver/transmitter","display_name":"Universal asynchronous receiver/transmitter","score":0.4342724680900574},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.3394492566585541},{"id":"https://openalex.org/keywords/chip","display_name":"Chip","score":0.2817055583000183},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.25620394945144653},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16428375244140625},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.16106683015823364}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8051724433898926},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.6355865001678467},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6304792165756226},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6105677485466003},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5917776226997375},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5790066719055176},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.4534750282764435},{"id":"https://openalex.org/C526435321","wikidata":"https://www.wikidata.org/wiki/Q1303814","display_name":"Processor design","level":2,"score":0.44168993830680847},{"id":"https://openalex.org/C161911788","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Universal asynchronous receiver/transmitter","level":3,"score":0.4342724680900574},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.3394492566585541},{"id":"https://openalex.org/C165005293","wikidata":"https://www.wikidata.org/wiki/Q1074500","display_name":"Chip","level":2,"score":0.2817055583000183},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.25620394945144653},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16428375244140625},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.16106683015823364},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/hst.2019.8741036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/hst.2019.8741036","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W17575016","https://openalex.org/W57009924","https://openalex.org/W150223756","https://openalex.org/W1525451859","https://openalex.org/W1660562555","https://openalex.org/W1877577203","https://openalex.org/W1984641795","https://openalex.org/W1992291252","https://openalex.org/W2004814164","https://openalex.org/W2031533839","https://openalex.org/W2048994663","https://openalex.org/W2091895466","https://openalex.org/W2125730340","https://openalex.org/W2132172731","https://openalex.org/W2134539886","https://openalex.org/W2148888468","https://openalex.org/W2152926062","https://openalex.org/W2164327070","https://openalex.org/W2188327575","https://openalex.org/W2217245185","https://openalex.org/W2285334798","https://openalex.org/W2345527821","https://openalex.org/W2383940294","https://openalex.org/W2415881634","https://openalex.org/W2464661970","https://openalex.org/W2532499458","https://openalex.org/W2537286916","https://openalex.org/W2544955103","https://openalex.org/W2554750353","https://openalex.org/W2563836461","https://openalex.org/W2618829853","https://openalex.org/W2789820376","https://openalex.org/W2792498333","https://openalex.org/W3028654321","https://openalex.org/W4237773356","https://openalex.org/W4247495060","https://openalex.org/W4292003164","https://openalex.org/W6602304683","https://openalex.org/W6606067566","https://openalex.org/W6639359801","https://openalex.org/W6687118843"],"related_works":["https://openalex.org/W2373009277","https://openalex.org/W2359676351","https://openalex.org/W4361186892","https://openalex.org/W2355107020","https://openalex.org/W2360777251","https://openalex.org/W2357238836","https://openalex.org/W2392900920","https://openalex.org/W1930466355","https://openalex.org/W2385398018","https://openalex.org/W2352408023"],"abstract_inverted_index":{"The":[0,25],"recent":[1],"disclosure":[2],"of":[3,14,28,141],"the":[4,33,88,105,148],"Spectre":[5],"and":[6,23,61,104,127,144,158],"Meltdown":[7],"side-channel":[8],"vulnerabilities":[9],"offers":[10,137],"yet":[11],"another":[12],"example":[13],"modern":[15],"computer":[16],"architectures":[17],"prioritizing":[18],"performance":[19],"optimizations":[20],"over":[21],"security":[22],"privacy.":[24],"devastating":[26],"impact":[27],"data":[29,44,70],"leakage,":[30],"however,":[31],"emphasizes":[32],"need":[34,89],"for":[35,43,80,90,107],"new":[36],"processor":[37,132],"designs":[38,79],"that":[39,68],"provide":[40],"native":[41],"support":[42],"privacy":[45],"using":[46,73,164],"cryptography.":[47],"In":[48],"this":[49],"paper,":[50],"we":[51],"report":[52],"on":[53,114],"a":[54,64,130],"year-long":[55],"effort":[56],"to":[57,129,156],"design,":[58],"implement,":[59],"fabricate,":[60],"validate":[62],"CoPHEE:":[63],"novel":[65],"co-processor":[66,119,163],"design":[67,145,155],"mitigates":[69],"leakage":[71],"risks":[72],"partially":[74],"homomorphic":[75],"encrypted":[76,81,115],"execution.":[77],"ASIC":[78,149],"execution":[82,113],"impose":[83],"unique":[84],"challenges,":[85],"such":[86],"as":[87],"non-traditional":[91],"arithmetic":[92],"units":[93,110],"(modular":[94],"inverse,":[95],"greatest":[96],"common":[97],"divisor),":[98],"very":[99],"wide":[100],"datapaths":[101],"(2048":[102],"bits),":[103],"requirement":[106],"secure":[108],"multiplexer":[109],"enabling":[111],"general-purpose":[112],"values.":[116],"Our":[117],"fully-functional":[118],"chip":[120],"is":[121],"fabricated":[122],"in":[123,147,174],"65nm":[124],"CMOS":[125],"technology,":[126],"communicates":[128],"main":[131],"via":[133],"UART.":[134],"This":[135],"paper":[136],"an":[138,175],"elaborate":[139],"overview":[140],"all":[142],"steps":[143],"techniques":[146],"development":[150],"process,":[151],"ranging":[152],"from":[153],"RTL":[154,170],"fabrication":[157],"validation.":[159],"We":[160],"evaluate":[161],"our":[162,169],"data-oblivious":[165],"C++":[166],"benchmarks,":[167],"while":[168],"files":[171],"are":[172],"available":[173],"open-source":[176],"repository.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
