{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:58:27Z","timestamp":1767923907525,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["727528"],"award-info":[{"award-number":["727528"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003391","name":"Fonds Unique Interminist\u00e9riel","doi-asserted-by":"publisher","award":["CRYPTOCOMP project"],"award-info":[{"award-number":["CRYPTOCOMP project"]}],"id":[{"id":"10.13039\/501100003391","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SPAWAR Systems Center Pacific","award":["NISE Program"],"award-info":[{"award-number":["NISE Program"]}]},{"name":"Microsoft Corporation"},{"DOI":"10.13039\/100007065","name":"Nvidia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","award":["REVET Project"],"award-info":[{"award-number":["REVET Project"]}],"id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["ILIR and ESTEP Programs"],"award-info":[{"award-number":["ILIR and ESTEP Programs"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100011039","name":"Intelligence Advanced Research Projects Activity","doi-asserted-by":"publisher","award":["RAMPARTS Project"],"award-info":[{"award-number":["RAMPARTS Project"]}],"id":[{"id":"10.13039\/100011039","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1561536"],"award-info":[{"award-number":["1561536"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3264420","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"2160-2162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Building Applications with Homomorphic Encryption"],"prefix":"10.1145","author":[{"given":"Roger A.","family":"Hallman","sequence":"first","affiliation":[{"name":"SPAWAR Systems Center Pacific &amp; Dartmouth College, San Diego, CA, USA"}]},{"given":"Kim","family":"Laine","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Wei","family":"Dai","sequence":"additional","affiliation":[{"name":"Worcester Polytechnic Institute, Worcester, MA, USA"}]},{"given":"Nicolas","family":"Gama","sequence":"additional","affiliation":[{"name":"Inpher, Inc., Lusanne, Switzerland"}]},{"given":"Alex J.","family":"Malozemoff","sequence":"additional","affiliation":[{"name":"Galois, Inc, Portland, OR, USA"}]},{"given":"Yuriy","family":"Polyakov","sequence":"additional","affiliation":[{"name":"NJIT Cybersecurity Research Center, Newark, NJ, USA"}]},{"given":"Sergiu","family":"Carpov","sequence":"additional","affiliation":[{"name":"CEA, LIST, 91191 Gif-sur-Yvette Cedex, France"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. CUDA Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuHE. (2016).  2016. CUDA Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuHE. (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. HomomorphicEncryption.org. (2017).  2017. HomomorphicEncryption.org. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Cingulata. https:\/\/github.com\/CEA-LIST\/Cingulata. (2018).  2018. Cingulata. https:\/\/github.com\/CEA-LIST\/Cingulata. (2018)."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. CUDA-accelerated Fully Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuFHE. (2018).  2018. CUDA-accelerated Fully Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuFHE. (2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. HElib. https:\/\/github.com\/shaih\/HElib. (2018).  2018. HElib. https:\/\/github.com\/shaih\/HElib. (2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"2018. The PALISADE Lattice Cryptography Library. https:\/\/git.njit.edu\/palisade\/ PALISADE. (2018).  2018. The PALISADE Lattice Cryptography Library. https:\/\/git.njit.edu\/palisade\/ PALISADE. (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"2018. RAMPARTS: RApid Machine-learning Processing Applications and Reconfigurable Targeting of Security. https:\/\/galois.com\/project\/ramparts\/. (2018).  2018. RAMPARTS: RApid Machine-learning Processing Applications and Reconfigurable Targeting of Security. https:\/\/galois.com\/project\/ramparts\/. (2018)."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. The Simple Encrypted Arithmetic Library (SEAL). http:\/\/sealcrypto.org. (2018).  2018. The Simple Encrypted Arithmetic Library (SEAL). http:\/\/sealcrypto.org. (2018)."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. TFHE: Fast Fully Homomorphic Encryption over the Torus. https:\/\/tfhe.github.io\/tfhe\/. (2018).  2018. TFHE: Fast Fully Homomorphic Encryption over the Torus. https:\/\/tfhe.github.io\/tfhe\/. (2018)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i2.70-95"},{"key":"e_1_3_2_1_11_1","volume-title":"Bharadwaj Veeravalli, and Kurt Rohloff.","author":"Badawi Ahmad Al","year":"2018","unstructured":"Ahmad Al Badawi , Yuriy Polyakov , Khin Mi Mi Aung , Bharadwaj Veeravalli, and Kurt Rohloff. 2018 . Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. Cryptology ePrint Archive, Report 2018\/589. (2018). https:\/\/eprint.iacr.org\/2018\/589. Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, and Kurt Rohloff. 2018. Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. Cryptology ePrint Archive, Report 2018\/589. (2018). https:\/\/eprint.iacr.org\/2018\/589."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.94"},{"key":"e_1_3_2_1_15_1","volume-title":"CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework","author":"Diallo Mamadou H.","unstructured":"Mamadou H. Diallo , Michael August , Roger Hallman , Megan Kline , Henry Au , and Vic Beach . 2016. CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework . In Financial Cryptography and Data Security, Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 319--327. Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, and Vic Beach. 2016. CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework. In Financial Cryptography and Data Security, Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 319--327."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3264420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3264420","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3264420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3264420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":15,"alternative-id":["10.1145\/3243734.3264420","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3264420","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}