{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:36:57Z","timestamp":1773247017599,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,19]]},"DOI":"10.1145\/3453483.3454050","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T16:58:48Z","timestamp":1624553928000},"page":"375-389","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Porcupine: a synthesizing compiler for vectorized homomorphic encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1052-0179","authenticated-orcid":false,"given":"Meghan","family":"Cowan","sequence":"first","affiliation":[{"name":"Facebook Reality Labs Research, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1259-426X","authenticated-orcid":false,"given":"Deeksha","family":"Dangwal","sequence":"additional","affiliation":[{"name":"Facebook Reality Labs Research, USA"}]},{"given":"Armin","family":"Alaghi","sequence":"additional","affiliation":[{"name":"Facebook Reality Labs Research, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5776-1121","authenticated-orcid":false,"given":"Caroline","family":"Trippel","sequence":"additional","affiliation":[{"name":"Stanford University, USA"}]},{"given":"Vincent T.","family":"Lee","sequence":"additional","affiliation":[{"name":"Facebook Reality Labs Research, USA"}]},{"given":"Brandon","family":"Reagen","sequence":"additional","affiliation":[{"name":"New York University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Homomorphic Encryption Security Standard. HomomorphicEncryption.org","author":"Albrecht Martin","unstructured":"Martin Albrecht , Melissa Chase , Hao Chen , Jintai Ding , Shafi Goldwasser , Sergey Gorbunov , Shai Halevi , Jeffrey Hoffstein , Kim Laine , Kristin Lauter , Satya Lokam , Daniele Micciancio , Dustin Moody , Travis Morrison , Amit Sahai , and Vinod Vaikuntanathan . 2018. Homomorphic Encryption Security Standard. HomomorphicEncryption.org , Toronto, Canada . Martin Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, and Vinod Vaikuntanathan. 2018. Homomorphic Encryption Security Standard. HomomorphicEncryption.org, Toronto, Canada."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2013.6679385"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358945"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442529"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893582.2893591"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103670"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243828"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. 265\u2013284.  Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. 265\u2013284.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_18_1","first-page":"144","article-title":"Somewhat Practical Fully Homomorphic Encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat Practical Fully Homomorphic Encryption .. IACR Cryptol. ePrint Arch. , 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption.. IACR Cryptol. ePrint Arch., 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307\u2013328.  Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307\u2013328.","DOI":"10.1145\/3335741.3335755"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993506"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sumit Gulwani Oleksandr Polozov and Rishabh Singh. 2017. Program synthesis. Foundations and Trends\u00ae in Programming Languages.  Sumit Gulwani Oleksandr Polozov and Rishabh Singh. 2017. Program synthesis. Foundations and Trends\u00ae in Programming Languages.","DOI":"10.1561\/9781680832938"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_1_27_1","volume-title":"Gazelle: A low latency framework for secure neural network inference. arXiv preprint arXiv:1801.05507.","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . Gazelle: A low latency framework for secure neural network inference. arXiv preprint arXiv:1801.05507. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. Gazelle: A low latency framework for secure neural network inference. arXiv preprint arXiv:1801.05507."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385996"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851199"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_31_1","volume-title":"Flann-fast library for approximate nearest neighbors user manual. Computer Science Department","author":"Muja Marius","unstructured":"Marius Muja and David Lowe . 2009. Flann-fast library for approximate nearest neighbors user manual. Computer Science Department , University of British Columbia , Vancouver, BC , Canada. Marius Muja and David Lowe. 2009. Flann-fast library for approximate nearest neighbors user manual. Computer Science Department, University of British Columbia, Vancouver, BC, Canada."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360598"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Catuscia Palamidessi and Marco Stronati. 2012. Differential privacy for relational algebra: Improving the sensitivity bounds via constraint systems. arXiv preprint arXiv:1207.0872.  Catuscia Palamidessi and Marco Stronati. 2012. Differential privacy for relational algebra: Improving the sensitivity bounds via constraint systems. arXiv preprint arXiv:1207.0872.","DOI":"10.4204\/EPTCS.85.7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304059"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594339"},{"key":"e_1_3_2_1_36_1","volume-title":"PALISADE lattice cryptography library user manual","author":"Polyakov Yuriy","unstructured":"Yuriy Polyakov , Kurt Rohloff , and Gerard W Ryan . 2017. PALISADE lattice cryptography library user manual . Cybersecurity Research Center, New Jersey Institute ofTechnology (NJIT) , Tech. Rep. Yuriy Polyakov, Kurt Rohloff, and Gerard W Ryan. 2017. PALISADE lattice cryptography library user manual. Cybersecurity Research Center, New Jersey Institute ofTechnology (NJIT), Tech. Rep."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.840306"},{"key":"e_1_3_2_1_38_1","unstructured":"Racket. [n.d.]. The Racket programming language. racketlang.org  Racket. [n.d.]. The Racket programming language. racketlang.org"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_1_40_1","volume-title":"Cheetah: Optimizations and Methods for Privacy Preserving Inference via Homomorphic Encryption. arXiv preprint arXiv:2006.00505.","author":"Reagen Brandon","year":"2020","unstructured":"Brandon Reagen , Wooseok Choi , Yeongil Ko , Vincent Lee , Gu-Yeon Wei , Hsien-Hsin S Lee , and David Brooks . 2020 . Cheetah: Optimizations and Methods for Privacy Preserving Inference via Homomorphic Encryption. arXiv preprint arXiv:2006.00505. Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S Lee, and David Brooks. 2020. Cheetah: Optimizations and Methods for Privacy Preserving Inference via Homomorphic Encryption. arXiv preprint arXiv:2006.00505."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_43_1","first-page":"297","article-title":"Airavat: Security and privacy for MapReduce","volume":"10","author":"Roy Indrajit","year":"2010","unstructured":"Indrajit Roy , Srinath TV Setty , Ann Kilzer , Vitaly Shmatikov , and Emmett Witchel . 2010 . Airavat: Security and privacy for MapReduce .. In NSDI. 10 , 297 \u2013 312 . Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. 2010. Airavat: Security and privacy for MapReduce.. In NSDI. 10, 297\u2013312.","journal-title":"NSDI."},{"key":"e_1_3_2_1_44_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL Microsoft Research","author":"Microsoft SEAL","unstructured":"2020. Microsoft SEAL (release 3.5). https:\/\/github.com\/Microsoft\/SEAL Microsoft Research , Redmond, WA . 2020. Microsoft SEAL (release 3.5). https:\/\/github.com\/Microsoft\/SEAL Microsoft Research, Redmond, WA."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462195"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1994.315935"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509586"},{"key":"e_1_3_2_1_50_1","unstructured":"Xiao Wang Alex J Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit.  Xiao Wang Alex J Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit."},{"key":"e_1_3_2_1_51_1","volume-title":"27th Annual Symposium on Foundations of Computer Science (sfcs","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to generate and exchange secrets . In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986)."},{"key":"e_1_3_2_1_52_1","first-page":"1153","article-title":"Obliv-C: A Language for Extensible Data-Oblivious Computation","volume":"2015","author":"Zahur Samee","year":"2015","unstructured":"Samee Zahur and David Evans . 2015 . Obliv-C: A Language for Extensible Data-Oblivious Computation .. IACR Cryptol. ePrint Arch. , 2015 (2015), 1153 . Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation.. IACR Cryptol. ePrint Arch., 2015 (2015), 1153.","journal-title":"IACR Cryptol. ePrint Arch."}],"event":{"name":"PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","location":"Virtual Canada","acronym":"PLDI '21","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453483.3454050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453483.3454050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:47Z","timestamp":1750193267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453483.3454050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":51,"alternative-id":["10.1145\/3453483.3454050","10.1145\/3453483"],"URL":"https:\/\/doi.org\/10.1145\/3453483.3454050","relation":{},"subject":[],"published":{"date-parts":[[2021,6,18]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}