{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T11:35:03Z","timestamp":1770723303491,"version":"3.49.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/hpec.2015.7322470","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:12:34Z","timestamp":1447351954000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Parallel vectorized algebraic AES in Matlab for rapid prototyping of encrypted sensor processing algorithms and database analytics"],"prefix":"10.1109","author":[{"given":"Jeremy","family":"Kepner","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Gadepally","sequence":"additional","affiliation":[]},{"given":"Braden","family":"Hancock","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Michaleas","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Michel","sequence":"additional","affiliation":[]},{"given":"Mayank","family":"Varia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2014.66"},{"key":"ref32","year":"0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.155"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref37","article-title":"Protocols for Secure Computations (Extended Abstract)","author":"yao","year":"0","journal-title":"1982 FOCS"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2723872.2723877"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_16"},{"key":"ref34","author":"sutherlnnd","year":"0","journal-title":"Personal communication"},{"key":"ref10","author":"daemen","year":"2002","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard"},{"key":"ref11","article-title":"Cyber Security and Reliability in a Digital Cloud","author":"evans","year":"2013","journal-title":"U S Department of Defense Science Board Study"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2285159"},{"key":"ref13","article-title":"Sifter: A Generalized, Efficient, and Scalable Big Data Corpus Generator","author":"gadepally","year":"2015","journal-title":"New England Database Day"},{"key":"ref14","article-title":"Improving the Veracity of Homeland Security Big Data Through Computing on Masked Data","author":"gadepally","year":"2015","journal-title":"IEEE HST"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref16","article-title":"Algorithms in HElib","author":"halevi","year":"0","journal-title":"Cryptology ePrint Archive"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2012.6408670"},{"key":"ref18","author":"kepner","year":"0","journal-title":"Parallel Matlab for Multicore and Multinode Computers SIAM Press 2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6289129"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.vlsi.2005.12.013"},{"key":"ref4","article-title":"Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)","author":"ben-or","year":"0","journal-title":"STOC 1988"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35170-9_24"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref6","article-title":"Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries","author":"cash","year":"0","journal-title":"CryptArchi 2013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093506"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.1"},{"key":"ref8","first-page":"13","article-title":"Template attacks","volume":"2523","author":"chari","year":"2002","journal-title":"CHES"},{"key":"ref7","article-title":"The Abstract Algebra of Big Data and Associative Arrays","author":"chaidez","year":"2014","journal-title":"SIAM Meeting on Discrete Math"},{"key":"ref2","author":"artin","year":"2011","journal-title":"Algebra"},{"key":"ref9","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/180\/1\/012037"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7040946"},{"key":"ref22","author":"kepner","year":"0","journal-title":"Mathematics of Big Data Spreadsheets Databases Matices and Graph"},{"key":"ref21","article-title":"Associative Arrays: Unified Mathematics for Spreadsheets, Databases, Matrices, and Graphs","author":"kepner","year":"2015","journal-title":"New England Database Day"},{"key":"ref24","first-page":"388","article-title":"Differential power analysis","author":"kocher","year":"1999","journal-title":"Crypto"},{"key":"ref23","article-title":"Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems","author":"kocher","year":"1996","journal-title":"Crypto"},{"key":"ref26","first-page":"1","article-title":"Cache attacks and countermeasures: the case of AES","author":"osvik","year":"2006","journal-title":"CT-RSA"},{"key":"ref25","first-page":"150","article-title":"Securing the AES finalists against power analysis attacks","author":"messerges","year":"2001","journal-title":"Fast Software Encryption"}],"event":{"name":"2015 IEEE High Performance Extreme Computing Conference (HPEC)","location":"Waltham, MA, USA","start":{"date-parts":[[2015,9,15]]},"end":{"date-parts":[[2015,9,17]]}},"container-title":["2015 IEEE High Performance Extreme Computing Conference (HPEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7311169\/7322434\/07322470.pdf?arnumber=7322470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:49:09Z","timestamp":1490402949000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7322470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/hpec.2015.7322470","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}