{"id":"https://openalex.org/W4391305851","doi":"https://doi.org/10.1109/tcad.2024.3359526","title":"Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption","display_name":"Silicon-Proven ASIC Design for the Polynomial Operations of Fully Homomorphic Encryption","publication_year":2024,"publication_date":"2024-01-29","ids":{"openalex":"https://openalex.org/W4391305851","doi":"https://doi.org/10.1109/tcad.2024.3359526"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2024.3359526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2024.3359526","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110703612","display_name":"Mohammed Nabeel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mohammed Nabeel","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-3924-7356","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022868555","display_name":"Homer Gamil","orcid":"https://orcid.org/0000-0003-3256-783X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Homer Gamil","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0003-3256-783X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088166931","display_name":"Deepraj Soni","orcid":"https://orcid.org/0000-0003-1732-088X"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Deepraj Soni","raw_affiliation_strings":["Center for Cyber Security, New York University, New York, NY, USA"],"raw_orcid":"https://orcid.org/0000-0003-1732-088X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101674293","display_name":"Mohammed Ashraf","orcid":"https://orcid.org/0009-0009-0812-8053"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammed Ashraf","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023885635","display_name":"Mizan Abraha Gebremichael","orcid":null},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mizan Abraha Gebremichael","raw_affiliation_strings":["Electrical Engineering Department, Khalifa University, Abu Dhabi, UAE"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Khalifa University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0002-1938-912X","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059648257","display_name":"Ramesh Karri","orcid":"https://orcid.org/0000-0001-7989-5617"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ramesh Karri","raw_affiliation_strings":["Center for Cyber Security, New York University, New York, NY, USA"],"raw_orcid":"https://orcid.org/0000-0001-7989-5617","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090479435","display_name":"Mihai Sanduleanu","orcid":"https://orcid.org/0000-0001-7170-4062"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Mihai Sanduleanu","raw_affiliation_strings":["Electrical Engineering Department, Khalifa University, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0001-7170-4062","affiliations":[{"raw_affiliation_string":"Electrical Engineering Department, Khalifa University, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":"https://orcid.org/0000-0001-6899-0651","affiliations":[{"raw_affiliation_string":"Center for Cyber Security, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5110703612"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6557,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85121408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":"43","issue":"6","first_page":"1924","last_page":"1928"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8676460981369019},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.7495501041412354},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.559005618095398},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48128408193588257},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4351472854614258},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4001263678073883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27324187755584717},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.23263534903526306}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8676460981369019},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.7495501041412354},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.559005618095398},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48128408193588257},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4351472854614258},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4001263678073883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27324187755584717},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.23263534903526306},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcad.2024.3359526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2024.3359526","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2435473771","https://openalex.org/W2934510082","https://openalex.org/W3012235108","https://openalex.org/W3185722301","https://openalex.org/W3200060699","https://openalex.org/W4231896027","https://openalex.org/W4281609193","https://openalex.org/W4281792301","https://openalex.org/W4307925365","https://openalex.org/W4318478221","https://openalex.org/W4379115979","https://openalex.org/W6801747013"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361","https://openalex.org/W2403663234"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2],"we":[3,94],"elaborate":[4],"on":[5,100],"our":[6,101],"endeavors":[7],"to":[8,70,106],"design,":[9],"implement,":[10],"fabricate,":[11],"and":[12,46,50,81,85,97,103,110],"post-silicon":[13],"validate":[14],"CoFHEE":[15,35,60],"1,":[16],"a":[17,29,75],"co-processor":[18],"for":[19],"low-level":[20],"polynomial":[21,41,44,66],"operations":[22],"targeting":[23],"Fully":[24],"Homomorphic":[25],"Encryption":[26],"execution.":[27],"With":[28],"compact":[30],"design":[31],"area":[32],"of":[33,39,63,68,78],"12mm2,":[34],"features":[36],"ASIC":[37,112],"implementations":[38,109],"fundamental":[40],"operations,":[42],"including":[43],"addition":[45],"subtraction,":[47],"Hadamard":[48],"product,":[49],"Number":[51],"Theoretic":[52],"Transform,":[53],"which":[54],"underlie":[55],"most":[56],"higher-level":[57],"FHE":[58],"primitives.":[59],"is":[61],"capable":[62],"natively":[64],"supporting":[65],"degrees":[67],"up":[69],"n":[71],"=":[72],"214":[73],"with":[74],"coefficient":[76],"size":[77],"128":[79],"bits,":[80],"has":[82],"been":[83],"fabricated":[84],"silicon-verified":[86],"using":[87],"55nm":[88],"CMOS":[89],"technology.":[90],"To":[91],"evaluate":[92],"it,":[93],"conduct":[95],"performance":[96],"power":[98],"experiments":[99],"chip,":[102],"compare":[104],"it":[105],"state-of-the-art":[107],"software":[108],"other":[111],"designs.":[113]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
