{"id":"https://openalex.org/W4386323596","doi":"https://doi.org/10.1109/icce-taiwan58799.2023.10226762","title":"VLSI Design of Number Theoretic Transform for BGV Fully Homomorphic Encryption","display_name":"VLSI Design of Number Theoretic Transform for BGV Fully Homomorphic Encryption","publication_year":2023,"publication_date":"2023-07-17","ids":{"openalex":"https://openalex.org/W4386323596","doi":"https://doi.org/10.1109/icce-taiwan58799.2023.10226762"},"language":"en","primary_location":{"id":"doi:10.1109/icce-taiwan58799.2023.10226762","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100714455","display_name":"Kuan\u2010Yu Chen","orcid":"https://orcid.org/0000-0002-4020-9103"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Kuan-Yu Chen","raw_affiliation_strings":["National Cheng Kung University,Department of Electrical Engineering,Tainan City,Taiwan, R.O.C.,701"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University,Department of Electrical Engineering,Tainan City,Taiwan, R.O.C.,701","institution_ids":["https://openalex.org/I91807558"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053167526","display_name":"Ming\u2010Der Shieh","orcid":"https://orcid.org/0000-0002-7361-1860"},"institutions":[{"id":"https://openalex.org/I91807558","display_name":"National Cheng Kung University","ror":"https://ror.org/01b8kcc49","country_code":"TW","type":"education","lineage":["https://openalex.org/I91807558"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ming-Der Shieh","raw_affiliation_strings":["National Cheng Kung University,Department of Electrical Engineering,Tainan City,Taiwan, R.O.C.,701"],"affiliations":[{"raw_affiliation_string":"National Cheng Kung University,Department of Electrical Engineering,Tainan City,Taiwan, R.O.C.,701","institution_ids":["https://openalex.org/I91807558"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100714455"],"corresponding_institution_ids":["https://openalex.org/I91807558"],"apc_list":null,"apc_paid":null,"fwci":0.1746,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55500221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"537","last_page":"538"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7795248031616211},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.682749330997467},{"id":"https://openalex.org/keywords/very-large-scale-integration","display_name":"Very-large-scale integration","score":0.6045888662338257},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3879425525665283},{"id":"https://openalex.org/keywords/computer-architecture","display_name":"Computer architecture","score":0.320588618516922},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.19204196333885193},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11833354830741882}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7795248031616211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.682749330997467},{"id":"https://openalex.org/C14580979","wikidata":"https://www.wikidata.org/wiki/Q876049","display_name":"Very-large-scale integration","level":2,"score":0.6045888662338257},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3879425525665283},{"id":"https://openalex.org/C118524514","wikidata":"https://www.wikidata.org/wiki/Q173212","display_name":"Computer architecture","level":1,"score":0.320588618516922},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.19204196333885193},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11833354830741882}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icce-taiwan58799.2023.10226762","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icce-taiwan58799.2023.10226762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1498685334","https://openalex.org/W2152926062","https://openalex.org/W2764683856","https://openalex.org/W3005730048","https://openalex.org/W6629789561","https://openalex.org/W6656097609"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W2134640991","https://openalex.org/W3027318491","https://openalex.org/W101478184","https://openalex.org/W1986774039"],"abstract_inverted_index":{"Fully":[0],"Homomorphic":[1],"Encryption":[2],"(FHE)":[3],"can":[4],"directly":[5],"perform":[6],"desired":[7],"operations":[8],"on":[9,21],"ciphertext,":[10],"but":[11],"the":[12,24,56,68,84,89],"efficiency":[13],"of":[14,52],"various":[15],"FHE":[16],"systems":[17],"is":[18,27,34],"highly":[19],"dependent":[20],"how":[22],"effectively":[23],"homomorphic":[25],"multiplication":[26],"implemented.":[28],"The":[29,76],"Number":[30],"Theoretic":[31],"Transform":[32],"(NTT)":[33],"a":[35,80],"widely":[36],"used":[37],"method":[38],"for":[39,55],"carrying":[40],"out":[41],"large-sized":[42],"multiplication.":[43],"This":[44],"work":[45],"aims":[46],"at":[47],"developing":[48],"efficient":[49],"hardware":[50],"design":[51,72],"Bluestein\u2019s":[53],"NTT":[54],"latest":[57],"BGV-FHE.":[58],"Primes":[59],"with":[60],"low":[61],"Hamming":[62],"weight":[63],"are":[64],"selected":[65],"to":[66,88],"optimize":[67],"Barrett":[69],"modular":[70],"multiplier":[71],"and":[73],"memory":[74],"requirements.":[75],"experimental":[77],"results":[78],"demonstrate":[79],"significant":[81],"improvement":[82],"in":[83],"area":[85],"requirement":[86],"compared":[87],"related":[90],"work.":[91]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
