{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:04:19Z","timestamp":1775066659729,"version":"3.50.1"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T00:00:00Z","timestamp":1648857600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100004358","name":"Samsung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004358","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,2]]},"DOI":"10.1109\/cgo53902.2022.9741265","type":"proceedings-article","created":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T19:51:20Z","timestamp":1648583480000},"page":"193-204","source":"Crossref","is-referenced-by-count":24,"title":["HECATE: Performance-Aware Scale Optimization for Homomorphic Encryption Compiler"],"prefix":"10.1109","author":[{"given":"Yongwoo","family":"Lee","sequence":"first","affiliation":[{"name":"Yonsei University,Seoul,Republic of Korea"}]},{"given":"Seonyeong","family":"Heo","sequence":"additional","affiliation":[{"name":"ETH Zurich,Zurich,Switzerland"}]},{"given":"Seonyoung","family":"Cheon","sequence":"additional","affiliation":[{"name":"Yonsei University,Seoul,Republic of Korea"}]},{"given":"Shinnung","family":"Jeong","sequence":"additional","affiliation":[{"name":"Yonsei University,Seoul,Republic of Korea"}]},{"given":"Changsu","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University,Seoul,Republic of Korea"}]},{"given":"Eunkyung","family":"Kim","sequence":"additional","affiliation":[{"name":"Samsung SDS,Seoul,Republic of Korea"}]},{"given":"Dongyoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Stony Brook University,Stony Brook,USA"}]},{"given":"Hanjun","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University,Seoul,Republic of Korea"}]}],"member":"263","reference":[{"key":"ref39","year":"2020","journal-title":"Cingulata"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"ref33","article-title":"E3: A framework for compiling c++ programs with encrypted operands","author":"chielle","year":"2018","journal-title":"Cryptology ePrint Archive"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267978"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358945"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218508"},{"key":"ref36","article-title":"Sealion: a framework for neural network inference on encrypted data","author":"van elsloo","year":"2019"},{"key":"ref35","first-page":"375389","year":"2021","journal-title":"Porcupine A Synthesizing Compiler for Vectorized Homomorphic Encryption"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243828"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_1"},{"key":"ref27","article-title":"Homomorphic encryption security standard","author":"albrecht","year":"2018","journal-title":"HomomorphicEncryption org"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref1","article-title":"A fully homomorphic encryption scheme","author":"gentry","year":"2009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370308"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_31"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814630"},{"key":"ref50","first-page":"405","article-title":"Bit-Width Allocation for Hardware Accelerators for Scientific Computing Using SATModulo Theory","volume":"29","author":"kinsman","year":"0"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3377555.3377899"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref11","first-page":"311","article-title":"Scale-invariant fully homomorphic encryption over the integers","author":"coron","year":"2014","journal-title":"Workshop on Public Key Cryptography"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"ref16","year":"2020","journal-title":"Microsoft SEAL (Release 3 5 9)"},{"key":"ref17","year":"2020","journal-title":"HEAAN Open-Source HE Library"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref3","first-page":"129","article-title":"Implementing gentrys fully-homomorphic encryption scheme","volume":"6632","author":"gentry","year":"0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref7","first-page":"347","article-title":"A full rns variant of approximate homomorphic encryption","author":"cheon","year":"2018","journal-title":"Selected Areas in Cryptography-SAC 2018"},{"key":"ref49","article-title":"Hardware-oriented approximation of convolutional neural networks","author":"gysel","year":"2016","journal-title":"arXiv preprint arXiv 1604 03168"},{"key":"ref9","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"Cryptology ePrint Archive"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.1991.160742"},{"key":"ref45","first-page":"265","article-title":"Tensorflow: A system for largescale machine learning","author":"abadi","year":"2016","journal-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2934583.2934625"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI.2019.00036"},{"key":"ref42","year":"2020","journal-title":"The palisade lattice cryptography library"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385996"},{"key":"ref44","year":"2020","journal-title":"nGraph Deep Learning Compiler"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"}],"event":{"name":"2022 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2022,4,2]]},"end":{"date-parts":[[2022,4,6]]}},"container-title":["2022 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9741235\/9741095\/09741265.pdf?arnumber=9741265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:43:00Z","timestamp":1655239380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9741265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,2]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/cgo53902.2022.9741265","relation":{},"subject":[],"published":{"date-parts":[[2022,4,2]]}}}