{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:26:15Z","timestamp":1730327175145,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"vor","delay-in-days":407,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS 2312275"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,28]]},"DOI":"10.1145\/3613424.3614279","type":"proceedings-article","created":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T17:22:15Z","timestamp":1702056135000},"page":"670-684","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["GME: GPU-based Microarchitectural Extensions to Accelerate Homomorphic Encryption"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4449-7974","authenticated-orcid":false,"given":"Kaustubh","family":"Shivdikar","sequence":"first","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6308-3841","authenticated-orcid":false,"given":"Yuhui","family":"Bao","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9461-0170","authenticated-orcid":false,"given":"Rashmi","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Boston University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8834-4227","authenticated-orcid":false,"given":"Michael","family":"Shen","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3836-6353","authenticated-orcid":false,"given":"Gilbert","family":"Jonatan","sequence":"additional","affiliation":[{"name":"KAIST, Korea, South Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9157-5157","authenticated-orcid":false,"given":"Evelio","family":"Mora","sequence":"additional","affiliation":[{"name":"Universidad Cat\u00f3lica de Murcia, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-1731-0742","authenticated-orcid":false,"given":"Alexander","family":"Ingare","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4388-9850","authenticated-orcid":false,"given":"Neal","family":"Livesay","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3550-720X","authenticated-orcid":false,"given":"Jos\u00c9 L.","family":"Abell\u00c1N","sequence":"additional","affiliation":[{"name":"Universidad de Murcia, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3958-3891","authenticated-orcid":false,"given":"John","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Korea, South Republic of Korea"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3256-9942","authenticated-orcid":false,"given":"Ajay","family":"Joshi","sequence":"additional","affiliation":[{"name":"Boston University \/ Lightmatter, United States of America"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5692-0151","authenticated-orcid":false,"given":"David","family":"Kaeli","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Northeastern University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31754-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045465"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/TPDS.2020.3021238","article-title":"Multi-GPU design and performance evaluation of homomorphic encryption on GPU clusters","volume":"32","author":"Al\u00a0Badawi Ahmad","year":"2020","unstructured":"Ahmad Al\u00a0Badawi , Bharadwaj Veeravalli , Jie Lin , Nan Xiao , Matsumura Kazuaki , and Aung Khin\u00a0Mi Mi . 2020 . Multi-GPU design and performance evaluation of homomorphic encryption on GPU clusters . IEEE Transactions on Parallel and Distributed Systems 32 , 2 (2020), 379 \u2013 391 . Ahmad Al\u00a0Badawi, Bharadwaj Veeravalli, Jie Lin, Nan Xiao, Matsumura Kazuaki, and Aung Khin\u00a0Mi Mi. 2020. Multi-GPU design and performance evaluation of homomorphic encryption on GPU clusters. IEEE Transactions on Parallel and Distributed Systems 32, 2 (2020), 379\u2013391.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"volume-title":"High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA. IACR Transactions on Cryptographic Hardware and Embedded Systems","year":"2018","author":"Al\u00a0Badawi Ahmad","key":"e_1_3_2_1_5_1","unstructured":"Ahmad Al\u00a0Badawi , Bharadwaj Veeravalli , Chan\u00a0Fook Mun , and Khin Mi\u00a0Mi Aung . 2018. High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2018 ), 70\u201395. Ahmad Al\u00a0Badawi, Bharadwaj Veeravalli, Chan\u00a0Fook Mun, and Khin Mi\u00a0Mi Aung. 2018. High-performance FV somewhat homomorphic encryption on GPUs: An implementation using CUDA. IACR Transactions on Cryptographic Hardware and Embedded Systems (2018), 70\u201395."},{"key":"e_1_3_2_1_6_1","unstructured":"AMD 2020. AMD Instinct MI100 Instruction Set Architecture. AMD. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/instinct-tech-docs\/instruction-set-architectures\/instinct-mi100-cdna1-shader-instruction-set-architecture.pdfReference Guide. AMD 2020. AMD Instinct MI100 Instruction Set Architecture. AMD. https:\/\/www.amd.com\/content\/dam\/amd\/en\/documents\/instinct-tech-docs\/instruction-set-architectures\/instinct-mi100-cdna1-shader-instruction-set-architecture.pdfReference Guide."},{"key":"e_1_3_2_1_7_1","unstructured":"AMD Inc.2020. \"AMD Instinct MI100\" Instruction Set Architecture Reference Guide. https:\/\/developer.amd.com\/wp-content\/resources\/CDNA1_Shader_ISA_14December2020.pdf AMD Inc.2020. \"AMD Instinct MI100\" Instruction Set Architecture Reference Guide. https:\/\/developer.amd.com\/wp-content\/resources\/CDNA1_Shader_ISA_14December2020.pdf"},{"key":"e_1_3_2_1_8_1","unstructured":"AMD Inc.2020. Introducing CDNA Architecture The All-New AMD GPU Architecture for the Modern Era of HPC & AI. https:\/\/www.amd.com\/system\/files\/documents\/amd-cdna-whitepaper.pdf AMD Inc.2020. Introducing CDNA Architecture The All-New AMD GPU Architecture for the Modern Era of HPC & AI. https:\/\/www.amd.com\/system\/files\/documents\/amd-cdna-whitepaper.pdf"},{"key":"e_1_3_2_1_9_1","unstructured":"AMD Inc.2022. HIP Programming Guide. https:\/\/rocmdocs.amd.com\/en\/latest\/Programming_Guides\/HIP-GUIDE.html AMD Inc.2022. HIP Programming Guide. https:\/\/rocmdocs.amd.com\/en\/latest\/Programming_Guides\/HIP-GUIDE.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591635.2667187"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559009.3569666"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS51385.2021.00013"},{"key":"e_1_3_2_1_13_1","unstructured":"Flavio Bergamaschi. [n. d.]. HELib. https:\/\/github.com\/homenc\/HElib Flavio Bergamaschi. [n. d.]. HELib. https:\/\/github.com\/homenc\/HElib"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2018-0018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"volume-title":"Advances in Cryptology\u2013EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321","year":"2021","author":"Bossuat Jean-Philippe","key":"e_1_3_2_1_16_1","unstructured":"Jean-Philippe Bossuat , Christian Mouchet , Juan Troncoso-Pastoriza , and Jean-Pierre Hubaux . 2021. Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys . In Advances in Cryptology\u2013EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321 , 2021 , Proceedings, Part I. Springer , 587\u2013617. Jean-Philippe Bossuat, Christian Mouchet, Juan Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2021. Efficient bootstrapping for approximate homomorphic encryption with non-sparse keys. In Advances in Cryptology\u2013EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17\u201321, 2021, Proceedings, Part I. Springer, 587\u2013617."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2019.102568"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2330597"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40921-0_15"},{"volume-title":"Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security","year":"2017","author":"Cheon Jung\u00a0Hee","key":"e_1_3_2_1_20_1","unstructured":"Jung\u00a0Hee Cheon , Andrey Kim , Miran Kim , and Yongsoo Song . 2017. Homomorphic encryption for arithmetic of approximate numbers . In Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security , Hong Kong, China, December 3-7, 2017 , Proceedings, Part I 23. Springer , 409\u2013437. Jung\u00a0Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homomorphic encryption for arithmetic of approximate numbers. In Advances in Cryptology\u2013ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23. Springer, 409\u2013437."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.06075"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2016.04.006"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.12.002"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2112.06396"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1021\/acs.jctc.0c00145"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2022.3163817"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2010.2059718"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2205.14017"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"volume-title":"30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15\u201319, 2011. Proceedings 30","year":"2011","author":"Gentry Craig","key":"e_1_3_2_1_31_1","unstructured":"Craig Gentry and Shai Halevi . 2011 . Implementing gentry\u2019s fully-homomorphic encryption scheme. In Advances in Cryptology\u2013EUROCRYPT 2011 : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15\u201319, 2011. Proceedings 30 . Springer, 129\u2013148. Craig Gentry and Shai Halevi. 2011. Implementing gentry\u2019s fully-homomorphic encryption scheme. In Advances in Cryptology\u2013EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15\u201319, 2011. Proceedings 30. Springer, 129\u2013148."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2458523.2458536"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3569955"},{"volume-title":"USA","year":"2014","author":"Halevi Shai","key":"e_1_3_2_1_34_1","unstructured":"Shai Halevi and Victor Shoup . 2014 . Algorithms in helib. In Advances in Cryptology\u2013CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA , USA , August 17-21, 2014, Proceedings, Part I 34. Springer, 554\u2013571. Shai Halevi and Victor Shoup. 2014. Algorithms in helib. In Advances in Cryptology\u2013CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I 34. Springer, 554\u2013571."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC-NC.2010.49"},{"key":"e_1_3_2_1_37_1","first-page":"24254","article-title":"LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models","volume":"35","author":"Javaheripi Mojan","year":"2022","unstructured":"Mojan Javaheripi , Gustavo de Rosa , Subhabrata Mukherjee , Shital Shah , Tomasz Religa , Caio\u00a0Cesar Teodoro\u00a0Mendes , Sebastien Bubeck , Farinaz Koushanfar , and Debadeepta Dey . 2022 . LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models . Advances in Neural Information Processing Systems 35 (2022), 24254 \u2013 24267 . https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/hash\/9949e6906be6448230cdba9a4cb2d564-Abstract-Conference.html Mojan Javaheripi, Gustavo de Rosa, Subhabrata Mukherjee, Shital Shah, Tomasz Religa, Caio\u00a0Cesar Teodoro\u00a0Mendes, Sebastien Bubeck, Farinaz Koushanfar, and Debadeepta Dey. 2022. LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models. Advances in Neural Information Processing Systems 35 (2022), 24254\u201324267. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/hash\/9949e6906be6448230cdba9a4cb2d564-Abstract-Conference.html","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00030"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00772ED1V01Y201704CAC040"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12300"},{"volume-title":"Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems","year":"2021","author":"Jung Wonkyung","key":"e_1_3_2_1_41_1","unstructured":"Wonkyung Jung , Sangpyo Kim , Jung\u00a0Ho Ahn , Jung\u00a0Hee Cheon , and Younho Lee . 2021. Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2021 ), 114\u2013148. Wonkyung Jung, Sangpyo Kim, Jung\u00a0Ho Ahn, Jung\u00a0Hee Cheon, and Younho Lee. 2021. Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 114\u2013148."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096189"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2815521"},{"volume-title":"2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1237\u20131254","year":"2022","author":"Kim Jongmin","key":"e_1_3_2_1_44_1","unstructured":"Jongmin Kim , Gwangho Lee , Sangpyo Kim , Gina Sohn , Minsoo Rhu , John Kim , and Jung\u00a0Ho Ahn . 2022 . Ark: Fully homomorphic encryption accelerator with runtime data generation and inter-operation key reuse . In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1237\u20131254 . Jongmin Kim, Gwangho Lee, Sangpyo Kim, Gina Sohn, Minsoo Rhu, John Kim, and Jung\u00a0Ho Ahn. 2022. Ark: Fully homomorphic encryption accelerator with runtime data generation and inter-operation key reuse. In 2022 55th IEEE\/ACM International Symposium on Microarchitecture (MICRO). IEEE, 1237\u20131254."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"volume-title":"2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1\u20138.","year":"2019","author":"Kim Sunwoong","key":"e_1_3_2_1_46_1","unstructured":"Sunwoong Kim , Keewoo Lee , Wonhee Cho , Jung\u00a0Hee Cheon , and Rob\u00a0 A Rutenbar . 2019 . FPGA-based accelerators of fully pipelined modular multipliers for homomorphic encryption . In 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1\u20138. Sunwoong Kim, Keewoo Lee, Wonhee Cho, Jung\u00a0Hee Cheon, and Rob\u00a0A Rutenbar. 2019. FPGA-based accelerators of fully pipelined modular multipliers for homomorphic encryption. In 2019 International Conference on ReConFigurable Computing and FPGAs (ReConFig). IEEE, 1\u20138."},{"volume-title":"2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 56\u201364","year":"2020","author":"Kim Sunwoong","key":"e_1_3_2_1_47_1","unstructured":"Sunwoong Kim , Keewoo Lee , Wonhee Cho , Yujin Nam , Jung\u00a0Hee Cheon , and Rob\u00a0 A Rutenbar . 2020 . Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme . In 2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 56\u201364 . Sunwoong Kim, Keewoo Lee, Wonhee Cho, Yujin Nam, Jung\u00a0Hee Cheon, and Rob\u00a0A Rutenbar. 2020. Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme. In 2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM). IEEE, 56\u201364."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.93"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCET.2010.5486259"},{"volume-title":"International Conference on Machine Learning. PMLR, 12403\u201312422","year":"2022","author":"Lee Eunsang","key":"e_1_3_2_1_50_1","unstructured":"Eunsang Lee , Joon-Woo Lee , Junghyun Lee , Young-Sik Kim , Yongjune Kim , Jong-Seon No , and Woosuk Choi . 2022 . Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions . In International Conference on Machine Learning. PMLR, 12403\u201312422 . Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, and Woosuk Choi. 2022. Low-complexity deep convolutional neural networks on fully homomorphic encryption using multiplexed parallel convolutions. In International Conference on Machine Learning. PMLR, 12403\u201312422."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835937"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816021"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2016.15"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2023.3253052"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.033"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370036.2145832"},{"volume-title":"Lattice-based cryptography. Post-quantum cryptography","year":"2009","author":"Micciancio Daniele","key":"e_1_3_2_1_57_1","unstructured":"Daniele Micciancio and Oded Regev . 2009. Lattice-based cryptography. Post-quantum cryptography ( 2009 ), 147\u2013191. Daniele Micciancio and Oded Regev. 2009. Lattice-based cryptography. Post-quantum cryptography (2009), 147\u2013191."},{"volume-title":"Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64\u201370","year":"2020","author":"Mouchet Christian\u00a0Vincent","key":"e_1_3_2_1_58_1","unstructured":"Christian\u00a0Vincent Mouchet , Jean-Philippe Bossuat , Juan\u00a0Ram\u00f3n Troncoso-Pastoriza , and Jean-Pierre Hubaux . 2020 . Lattigo: A multiparty homomorphic encryption library in go . In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64\u201370 . Christian\u00a0Vincent Mouchet, Jean-Philippe Bossuat, Juan\u00a0Ram\u00f3n Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2020. Lattigo: A multiparty homomorphic encryption library in go. In Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. 64\u201370."},{"key":"e_1_3_2_1_59_1","unstructured":"Christian\u00a0Vincent Mouchet Jean-Philippe Bossuat Juan\u00a0Ram\u00f3n Troncoso-Pastoriza and Jean-Pierre Hubaux. 2022. Lattigo v4. Online: https:\/\/github.com\/tuneinsight\/lattigo. EPFL-LDS Tune Insight SA. Christian\u00a0Vincent Mouchet Jean-Philippe Bossuat Juan\u00a0Ram\u00f3n Troncoso-Pastoriza and Jean-Pierre Hubaux. 2022. Lattigo v4. Online: https:\/\/github.com\/tuneinsight\/lattigo. EPFL-LDS Tune Insight SA."},{"key":"e_1_3_2_1_60_1","unstructured":"OpenAI. 2023. March 20 CHATGPT outage: Here\u2019s what happened. https:\/\/openai.com\/blog\/march-20-chatgpt-outage OpenAI. 2023. March 20 CHATGPT outage: Here\u2019s what happened. https:\/\/openai.com\/blog\/march-20-chatgpt-outage"},{"volume-title":"Homomorphic Encryption on GPU","year":"2023","author":"\u00d6zcan Ali\u00a0\u015eah","key":"e_1_3_2_1_61_1","unstructured":"Ali\u00a0\u015eah \u00d6zcan , Can Ayduman , Enes\u00a0Recep T\u00fcrko\u011flu , and Erkay Sava\u015f . 2023. Homomorphic Encryption on GPU . IEEE Access ( 2023 ). Ali\u00a0\u015eah \u00d6zcan, Can Ayduman, Enes\u00a0Recep T\u00fcrko\u011flu, and Erkay Sava\u015f. 2023. Homomorphic Encryption on GPU. IEEE Access (2023)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2302.02407"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3012084"},{"key":"e_1_3_2_1_64_1","unstructured":"Yuriy Polyakov. [n. d.]. Palisade Library. https:\/\/gitlab.com\/palisade\/palisade-release Yuriy Polyakov. [n. d.]. Palisade Library. https:\/\/gitlab.com\/palisade\/palisade-release"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092951"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"volume-title":"Accelerator for computing on encrypted data. Cryptology ePrint Archive","year":"2021","author":"Roy Sujoy\u00a0Sinha","key":"e_1_3_2_1_67_1","unstructured":"Sujoy\u00a0Sinha Roy , Ahmet\u00a0Can Mert , Sunmin Kwon , Youngsam Shin , Donghoon Yoo , 2021. Accelerator for computing on encrypted data. Cryptology ePrint Archive ( 2021 ). Sujoy\u00a0Sinha Roy, Ahmet\u00a0Can Mert, Sunmin Kwon, Youngsam Shin, Donghoon Yoo, 2021. Accelerator for computing on encrypted data. Cryptology ePrint Archive (2021)."},{"volume-title":"2019 IEEE International symposium on high performance computer architecture (HPCA). IEEE, 387\u2013398","year":"2019","author":"Roy Sujoy\u00a0Sinha","key":"e_1_3_2_1_68_1","unstructured":"Sujoy\u00a0Sinha Roy , Furkan Turan , Kimmo Jarvinen , Frederik Vercauteren , and Ingrid Verbauwhede . 2019 . FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data . In 2019 IEEE International symposium on high performance computer architecture (HPCA). IEEE, 387\u2013398 . Sujoy\u00a0Sinha Roy, Furkan Turan, Kimmo Jarvinen, Frederik Vercauteren, and Ingrid Verbauwhede. 2019. FPGA-based high-performance parallel architecture for homomorphic computing on encrypted data. In 2019 IEEE International symposium on high performance computer architecture (HPCA). IEEE, 387\u2013398."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"volume-title":"International Journal of Information Security","year":"2023","author":"Sarhan Mohanad","key":"e_1_3_2_1_71_1","unstructured":"Mohanad Sarhan , Siamak Layeghy , Marcus Gallagher , and Marius Portmann . 2023. From zero-shot machine learning to zero-day attack detection . International Journal of Information Security ( 2023 ), 1\u201313. https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00676-0 Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, and Marius Portmann. 2023. From zero-shot machine learning to zero-day attack detection. International Journal of Information Security (2023), 1\u201313. https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00676-0"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2210.15424"},{"volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","key":"e_1_3_2_1_73_1","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research , Redmond, WA .. SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2014.02.006"},{"key":"e_1_3_2_1_75_1","unstructured":"Kaustubh Shivdikar. 2021. SMASH: Sparse Matrix Atomic Scratchpad Hashing. Ph.\u00a0D. Dissertation. https:\/\/www.researchgate.net\/publication\/352018010_SMASH_Sparse_Matrix_Atomic_Scratchpad_Hashing Copyright - Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works; Last updated - 2023-03-07. Kaustubh Shivdikar. 2021. SMASH: Sparse Matrix Atomic Scratchpad Hashing. Ph.\u00a0D. Dissertation. https:\/\/www.researchgate.net\/publication\/352018010_SMASH_Sparse_Matrix_Atomic_Scratchpad_Hashing Copyright - Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works; Last updated - 2023-03-07."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00013"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443338"},{"key":"e_1_3_2_1_78_1","unstructured":"Kaustubh Shivdikar Kaushal Paneri and David Kaeli. [n. d.]. Speeding up DNNs using HPL based Fine-grained Tiling for Distributed Multi-GPU Training. ([n. d.]). Kaustubh Shivdikar Kaushal Paneri and David Kaeli. [n. d.]. Speeding up DNNs using HPL based Fine-grained Tiling for Distributed Multi-GPU Training. ([n. d.])."},{"volume-title":"A computational introduction to number theory and algebra","author":"Shoup Victor","key":"e_1_3_2_1_79_1","unstructured":"Victor Shoup . 2009. A computational introduction to number theory and algebra . Cambridge University Press . https:\/\/shoup.net\/ntb\/ntb-v2.pdf Victor Shoup. 2009. A computational introduction to number theory and algebra. Cambridge University Press. https:\/\/shoup.net\/ntb\/ntb-v2.pdf"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2016.7500918"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322230"},{"volume-title":"Daisen: A Framework for Visualizing Detailed GPU Execution. Eurographics Conference on Visualization 40","year":"2021","author":"Sun Yifan","key":"e_1_3_2_1_82_1","unstructured":"Yifan Sun , Yixuan Zhang , Ali Mosallaei , Michael\u00a0 D Shah , Cody Dunne , and David Kaeli . 2021 . Daisen: A Framework for Visualizing Detailed GPU Execution. Eurographics Conference on Visualization 40 , 3 (2021), 239\u2013250. Yifan Sun, Yixuan Zhang, Ali Mosallaei, Michael\u00a0D Shah, Cody Dunne, and David Kaeli. 2021. Daisen: A Framework for Visualizing Detailed GPU Execution. Eurographics Conference on Visualization 40, 3 (2021), 239\u2013250."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2017.7943978"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2834899.2834905"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(00)00107-2"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9245437"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2108.04417"},{"volume-title":"2022 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 1\u20137.","year":"2022","author":"Ye Tian","key":"e_1_3_2_1_88_1","unstructured":"Tian Ye , Rajgopal Kannan , and Viktor\u00a0 K Prasanna . 2022 . FPGA Acceleration of Fully Homomorphic Encryption over the Torus . In 2022 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 1\u20137. Tian Ye, Rajgopal Kannan, and Viktor\u00a0K Prasanna. 2022. FPGA Acceleration of Fully Homomorphic Encryption over the Torus. In 2022 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 1\u20137."}],"event":{"name":"MICRO '23: 56th Annual IEEE\/ACM International Symposium on Microarchitecture","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Toronto ON Canada","acronym":"MICRO '23"},"container-title":["56th Annual IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613424.3614279","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613424.3614279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,8]],"date-time":"2023-12-08T17:38:59Z","timestamp":1702057139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613424.3614279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,28]]},"references-count":88,"alternative-id":["10.1145\/3613424.3614279","10.1145\/3613424"],"URL":"https:\/\/doi.org\/10.1145\/3613424.3614279","relation":{},"subject":[],"published":{"date-parts":[[2023,10,28]]},"assertion":[{"value":"2023-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}