{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T16:31:34Z","timestamp":1777653094913,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338469.3358944","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"45-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":133,"title":["nGraph-HE2"],"prefix":"10.1145","author":[{"given":"Fabian","family":"Boemer","sequence":"first","affiliation":[{"name":"Intel AI Research, San Diego, CA, USA"}]},{"given":"Anamaria","family":"Costache","sequence":"additional","affiliation":[{"name":"Intel AI Research, San Diego, CA, USA"}]},{"given":"Rosario","family":"Cammarota","sequence":"additional","affiliation":[{"name":"Intel AI Research, San Diego, CA, USA"}]},{"given":"Casimir","family":"Wierzynski","sequence":"additional","affiliation":[{"name":"Intel AI Research, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19)","unstructured":"2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/ riazi 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/ riazi"},{"key":"e_1_3_2_1_2_1","first-page":"265","article-title":"Tensorflow: a system for large-scale machine learning","volume":"16","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . Tensorflow: a system for large-scale machine learning . In OSDI , Vol. 16. 265 -- 283 . Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: a system for large-scale machine learning. In OSDI, Vol. 16. 265--283.","journal-title":"OSDI"},{"key":"e_1_3_2_1_3_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 311--323","author":"Barrett Paul","year":"1986","unstructured":"Paul Barrett . 1986 . Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor . In Conference on the Theory and Application of Cryptographic Techniques. Springer, 311--323 . Paul Barrett. 1986. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 311--323."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21568-2_29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Marcelo Blatt Alexander Gusev Yuriy Polyakov Kurt Rohloff and Vinod Vaikuntanathan. 2019. Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. (2019).  Marcelo Blatt Alexander Gusev Yuriy Polyakov Kurt Rohloff and Vinod Vaikuntanathan. 2019. Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. (2019).","DOI":"10.1186\/s12920-020-0719-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"e_1_3_2_1_7_1","volume-title":"CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. Cryptology ePrint Archive, Report 2018\/758. https:\/\/eprint.iacr. org\/2018\/758.","author":"Boura Christina","year":"2018","unstructured":"Christina Boura , Nicolas Gama , Mariya Georgieva , and Dimitar Jetchev . 2018 . CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. Cryptology ePrint Archive, Report 2018\/758. https:\/\/eprint.iacr. org\/2018\/758. Christina Boura, Nicolas Gama, Mariya Georgieva, and Dimitar Jetchev. 2018. CHIMERA: Combining Ring-LWE-based Fully Homomorphic Encryption Schemes. Cryptology ePrint Archive, Report 2018\/758. https:\/\/eprint.iacr. org\/2018\/758."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_10_1","volume-title":"Low Latency Privacy Preserving Inference. In International Conference on Machine Learning. https:\/\/github.com\/microsoft\/CryptoNets\/tree\/ 6db77e36c4103385f0a621284d0c3609f0308e74#cryptonets","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus , Oren Elisha , and Ran Gilad-Bachrach . 2019 . Low Latency Privacy Preserving Inference. In International Conference on Machine Learning. https:\/\/github.com\/microsoft\/CryptoNets\/tree\/ 6db77e36c4103385f0a621284d0c3609f0308e74#cryptonets Alon Brutzkus, Oren Elisha, and Ran Gilad-Bachrach. 2019. Low Latency Privacy Preserving Inference. In International Conference on Machine Learning. https:\/\/github.com\/microsoft\/CryptoNets\/tree\/ 6db77e36c4103385f0a621284d0c3609f0308e74#cryptonets"},{"key":"e_1_3_2_1_11_1","volume-title":"Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Tsai Chia","year":"2017","unstructured":"Chia che Tsai , Donald E. Porter , and Mona Vij . 2017 . Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . USENIX Association, Santa Clara, CA, 645--658. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai Chia che Tsai, Donald E. Porter, and Mona Vij. 2017. Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA, 645--658. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/tsai"},{"key":"e_1_3_2_1_12_1","unstructured":"Hao Chen Wei Dai Miran Kim and Yongsoo Song. [n. d.]. Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. ([n. d.]).  Hao Chen Wei Dai Miran Kim and Yongsoo Song. [n. d.]. Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. ([n. d.])."},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Selected Areas in Cryptography. Springer, 347--368","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon , Kyoohyung Han , Andrey Kim , Miran Kim , and Yongsoo Song . 2018 . A full RNS variant of approximate homomorphic encryption . In International Conference on Selected Areas in Cryptography. Springer, 347--368 . Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2018. A full RNS variant of approximate homomorphic encryption. In International Conference on Selected Areas in Cryptography. Springer, 347--368."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv preprint arXiv:1811.09953","author":"Chou Edward","year":"2018","unstructured":"Edward Chou , Josh Beal , Daniel Levy , Serena Yeung , Albert Haque , and Li Fei-Fei . 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv preprint arXiv:1811.09953 ( 2018 ). Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, and Li Fei-Fei. 2018. Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference. arXiv preprint arXiv:1811.09953 (2018)."},{"key":"e_1_3_2_1_17_1","volume-title":"Adam Procter, and Tristan J.Webb.","author":"Cyphers Scott","year":"2018","unstructured":"Scott Cyphers , Arjun K. Bansal , Anahita Bhiwandiwalla , Jayaram Bobba , Matthew Brookhart , Avijit Chakraborty , William Constable , Christian Convey , Leona Cook , Omar Kanawi , Robert Kimball , Jason Knight , Nikolay Korovaiko , Varun Kumar , Yixing Lao , Christopher R. Lishka , Jaikrishnan Menon , Jennifer Myers , Sandeep Aswath Narayana , Adam Procter, and Tristan J.Webb. 2018 . Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning. CoRR abs\/1801.08058 (2018). arXiv:1801.08058 http:\/\/arxiv.org\/abs\/1801.08058 Scott Cyphers, Arjun K. Bansal, Anahita Bhiwandiwalla, Jayaram Bobba, Matthew Brookhart, Avijit Chakraborty, William Constable, Christian Convey, Leona Cook, Omar Kanawi, Robert Kimball, Jason Knight, Nikolay Korovaiko, Varun Kumar, Yixing Lao, Christopher R. Lishka, Jaikrishnan Menon, Jennifer Myers, Sandeep Aswath Narayana, Adam Procter, and Tristan J.Webb. 2018. Intel nGraph: An Intermediate Representation, Compiler, and Executor for Deep Learning. CoRR abs\/1801.08058 (2018). arXiv:1801.08058 http:\/\/arxiv.org\/abs\/1801.08058"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Leonardo Dagum and Ramesh Menon. 1998. OpenMP: an industry standard API for shared-memory programming. IEEE computational science and engineering 5 1 (1998) 46--55.  Leonardo Dagum and Ramesh Menon. 1998. OpenMP: an industry standard API for shared-memory programming. IEEE computational science and engineering 5 1 (1998) 46--55.","DOI":"10.1109\/99.660313"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS.  Daniel Demmler Thomas Schneider and Michael Zohner. 2015. ABY-A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.. In NDSS.","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_24_1","volume-title":"International Conference on Machine Learning. 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning. 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201--210."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_4"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300044"},{"key":"e_1_3_2_1_27_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th (USENIX) Security Symposium (USENIX) Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th (USENIX) Security Symposium (USENIX) Security 18) . 1651--1669. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In 27th (USENIX) Security Symposium (USENIX) Security 18). 1651--1669."},{"key":"e_1_3_2_1_29_1","volume-title":"The CIFAR-10 dataset. online: http:\/\/www. cs. toronto. edu\/kriz\/cifar. html","author":"Krizhevsky Alex","year":"2014","unstructured":"Alex Krizhevsky , Vinod Nair , and Geoffrey Hinton . 2014. The CIFAR-10 dataset. online: http:\/\/www. cs. toronto. edu\/kriz\/cifar. html ( 2014 ). Alex Krizhevsky, Vinod Nair, and Geoffrey Hinton. 2014. The CIFAR-10 dataset. online: http:\/\/www. cs. toronto. edu\/kriz\/cifar. html (2014)."},{"key":"e_1_3_2_1_30_1","unstructured":"Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/ (1998).  Yann LeCun. 1998. The MNIST database of handwritten digits. http:\/\/yann. lecun. com\/exdb\/mnist\/ (1998)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_1_35_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W.  Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in PyTorch. In NIPS-W."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_37_1","unstructured":"Kurt Rohloff. 2018. The PALISADE Lattice Cryptography Library. Retrieved 2019-03--25 from https:\/\/git.njit.edu\/palisade\/PALISADE  Kurt Rohloff. 2018. The PALISADE Lattice Cryptography Library. Retrieved 2019-03--25 from https:\/\/git.njit.edu\/palisade\/PALISADE"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_2_1_39_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research , Redmond, WA . SEAL 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA."},{"key":"e_1_3_2_1_40_1","volume-title":"SEALion: a Framework for Neural Network Inference on Encrypted Data. arXiv preprint arXiv:1904.12840","author":"van Elsloo Tim","year":"2019","unstructured":"Tim van Elsloo , Giorgio Patrini , and Hamish Ivey-Law . 2019. SEALion: a Framework for Neural Network Inference on Encrypted Data. arXiv preprint arXiv:1904.12840 ( 2019 ). Tim van Elsloo, Giorgio Patrini, and Hamish Ivey-Law. 2019. SEALion: a Framework for Neural Network Inference on Encrypted Data. arXiv preprint arXiv:1904.12840 (2019)."},{"key":"e_1_3_2_1_41_1","first-page":"24","article-title":"SecureNN: 3-Party Secure Computation for Neural Network Training","volume":"1","author":"Wagh Sameer","year":"2019","unstructured":"Sameer Wagh , Divya Gupta , and Nishanth Chandran . 2019 . SecureNN: 3-Party Secure Computation for Neural Network Training . Proceedings on Privacy Enhancing Technologies 1 (2019), 24 . Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. SecureNN: 3-Party Secure Computation for Neural Network Training. Proceedings on Privacy Enhancing Technologies 1 (2019), 24.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_42_1","unstructured":"Wenhao Wang Yichen Jiang Qintao Shen Weihao Huang Hao Chen Shuang Wang XiaoFengWang Haixu Tang Kai Chen Kristin Lauter etal 2019. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. arXiv preprint arXiv:1905.07766 (2019).  Wenhao Wang Yichen Jiang Qintao Shen Weihao Huang Hao Chen Shuang Wang XiaoFengWang Haixu Tang Kai Chen Kristin Lauter et al. 2019. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. arXiv preprint arXiv:1905.07766 (2019)."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 7th ACM Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358944","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338469.3358944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338469.3358944"}},"subtitle":["A High-Throughput Framework for Neural Network Inference on Encrypted Data"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":39,"alternative-id":["10.1145\/3338469.3358944","10.1145\/3338469"],"URL":"https:\/\/doi.org\/10.1145\/3338469.3358944","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}