{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:33:58Z","timestamp":1772724838772,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507737","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"683-696","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Client-optimized algorithms and acceleration for encrypted compute offloading"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1583-6607","authenticated-orcid":false,"given":"McKenzie","family":"van der Hagen","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4130-1099","authenticated-orcid":false,"given":"Brandon","family":"Lucia","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"M. Abadi. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems (release 2.2). https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_2_1","volume-title":"SOTERIA: In Search of Efficient Neural Networks for Private Inference. arxiv:2007.12934.","author":"Aggarwal Anshul","year":"2020","unstructured":"Anshul Aggarwal, Trevor E. Carlson, Reza Shokri, and Shruti Tople. 2020. SOTERIA: In Search of Efficient Neural Networks for Private Inference. arxiv:2007.12934."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.13154\/tches.v2018.i2.70-95"},{"key":"e_1_3_2_1_4_1","unstructured":"Jean Claude Bajard Nicolas Meloni and Thomas Plantard. 2005. Efficient RNS Bases for Cryptography."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"F. Boemer A. Costache R. Cammarota and C. Wierzynski. 2019. nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data. arXiv:1908.04172v2.","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.) (Proceedings of Machine Learning Research","volume":"821","author":"Brutzkus Alon","year":"2019","unstructured":"Alon Brutzkus, Ran Gilad-Bachrach, and Oren Elisha. 2019. Low Latency Privacy Preserving Inference. In Proceedings of the 36th International Conference on Machine Learning, Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.) (Proceedings of Machine Learning Research, Vol. 97). PMLR, Long Beach, California, USA. 812\u2013821. https:\/\/proceedings.mlr.press\/v97\/brutzkus19a.html"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Hee-Jin Chae Daniel Yeager Joshua Smith and Kevin Fu. 2013. Wirelessly Powered Sensor Networks and Computational RFID. isbn:978-1-4419-6165-5 https:\/\/doi.org\/10.1007\/978-1-4419-6166-2_10 10.1007\/978-1-4419-6166-2_10","DOI":"10.1007\/978-1-4419-6166-2_10"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2016.2616357"},{"key":"e_1_3_2_1_13_1","unstructured":"J. H. Cheon A. Kim M. Kim and Y. Song. 2016. Homomorphic Encryption for Arithmetic of Approximate Numbers. Cryptology ePrint Archive Report 2016\/421. https:\/\/eprint.iacr.org\/2016\/421"},{"key":"e_1_3_2_1_14_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/.","author":"Chillotti Ilaria","year":"2016","unstructured":"Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach\u00e8ne. August 2016. TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ilaria Chillotti Marc Joye and Pascal Paillier. 2021. Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. https:\/\/whitepaper.zama.ai\/","DOI":"10.1007\/978-3-030-78086-9_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173210"},{"key":"e_1_3_2_1_17_1","unstructured":"D. Corvoysier. 2017. SqueezeNet for CIFAR-10. https:\/\/github.com\/kaizouman\/tensorsandbox\/tree\/master\/cifar10\/models\/squeeze"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"W. Dai and B. Sunar. 2015. cuHE: A Homomorphic Encryption Accelerator Library. In Cryptography and Information Security in the Balkans. Springer Ineternational Publishing Koper Slovenia. 169\u2013186.","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0378"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Dowlin Nathan","year":"2016","unstructured":"Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML\u201916). JMLR.org, New York, NY, USA. 201\u2013210."},{"key":"e_1_3_2_1_24_1","unstructured":"E. Freiman. 2018. Digit Recognizer for MlPack. https:\/\/https:\/\/github.com\/mlpack\/models\/tree\/master\/Kaggle"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2009.5411006"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_27_1","volume-title":"Yurii Sushko, and Bryant Gipson.","author":"Gorantala Shruthi","year":"2021","unstructured":"Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P. Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, Phillipp Schoppmann, Sasha Kulankhina, Alain Forget, David Marn, Cameron Tew, Rafael Misoczki, Bernat Guillen, Xinyu Ye, Dennis Kraft, Damien Desfontaines, Aishe Krishnamurthy, Miguel Guevara, Irippuge Milinda Perera, Yurii Sushko, and Bryant Gipson. 2021. A General Purpose Transpiler for Fully Homomorphic Encryption. Google LLC."},{"key":"e_1_3_2_1_28_1","unstructured":"S. Halevi and V. Shoup. 2014. Algorithms in HElib. Cryptology ePrint Archive Report 2014\/106. https:\/\/eprint.iacr.org\/2014\/106"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007787.3001163"},{"key":"e_1_3_2_1_31_1","unstructured":"HElib. 2019. HElib BGV Country Database Lookup Example. https:\/\/github.com\/homenc\/HElib\/tree\/master\/examples\/BGV_country_db_lookup"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292006.3300044"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173213"},{"key":"e_1_3_2_1_34_1","unstructured":"2020. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual."},{"key":"e_1_3_2_1_35_1","volume-title":"Permacam: A Wireless Camera Sensor Platform For Multi-Year Indoor Computer Vision Applications. https:\/\/conix.io\/wp-content\/uploads\/pubs\/3113\/jackson_permacam_conix_2020.pptx.pdf","author":"Jackson Neal","year":"2020","unstructured":"Neal Jackson and Prabal Dutta. 2020. Permacam: A Wireless Camera Sensor Platform For Multi-Year Indoor Computer Vision Applications. https:\/\/conix.io\/wp-content\/uploads\/pubs\/3113\/jackson_permacam_conix_2020.pptx.pdf"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918)","author":"Juvekar C.","year":"1931","unstructured":"C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918). USENIX Association, USA. 1651\u20131668. isbn:9781931971461"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00017"},{"key":"e_1_3_2_1_38_1","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky Alex","unstructured":"Alex Krizhevsky. 2009. Learning multiple layers of features from tiny images. University of Toronto."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"K. Laine. 2017. Simple Encrypted Arithmetic Library 2.3.1.","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"e_1_3_2_1_40_1","unstructured":"Y. LeCun C. Cortes and CJ. Burges. 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http:\/\/yann.lecun.com\/exdb\/mnist 2 (2010) 1."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"S. Liu and W. Deng. 2015. Very deep convolutional neural network based image classification using small training sample size. 730-734 pages.","DOI":"10.1109\/ACPR.2015.7486599"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950391"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"P. Longa and M. Naehrig. 2016. \u201cSpeeding up the number theoretic transform for faster ideal lattice-based cryptography. In Cryptology and Network Security. Springer Milan Italy. 124\u2013139.","DOI":"10.1007\/978-3-319-48965-0_8"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"e_1_3_2_1_47_1","volume-title":"Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. 2505\u20132522. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"e_1_3_2_1_48_1","volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy (SP). IEEE","author":"Mohassel P.","unstructured":"P. Mohassel and Y. Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE Symposium on Security and Privacy (SP). IEEE, San Jose, CA, USA. 19\u201338."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362053.3363491"},{"key":"e_1_3_2_1_50_1","unstructured":"Jack O\u2019Connor Samuel Neves Jean-Philippe Aumasson and Zooko Wilcox-O\u2019Hearn. 2019. BLAKE3. https:\/\/github.com\/BLAKE3-team\/BLAKE3"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00069"},{"key":"e_1_3_2_1_52_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d\u2019Alch\u00e9 Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., Red Hook, NY, USA. 8024\u20138035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0733"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485971"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2017.2697841"},{"key":"e_1_3_2_1_58_1","unstructured":"Microsoft Research. 2019. Microsoft SEAL (release 3.4). https:\/\/github.com\/Microsoft\/SEAL"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_60_1","volume-title":"XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Riazi M. Sadegh","year":"2019","unstructured":"M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. 1501\u20131518. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/riazi"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 16th International Workshop on Cryptographic Hardware Embedded Systems (CHES). Springer","author":"Roy S.S.","unstructured":"S.S. Roy, F. Vercauteren, N. Mentens, D.D. Chen, and I. Verbauwhede. 2014. Compact Ring-LWE cryptoprocessor. In Proceedings of the 16th International Workshop on Cryptographic Hardware Embedded Systems (CHES). Springer, Busan, South Korea. 371\u2013391."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358299"},{"key":"e_1_3_2_1_66_1","unstructured":"NXP Semiconductors. 2016. IMX6ULL Power Consumption Application Note. arm. https:\/\/www.nxp.com\/docs\/en\/application-note\/AN5345.pdf"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00044"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"e_1_3_2_1_69_1","unstructured":"Tensorflow. 2016. Lenet-5-like Convolutional MNIST Model Example. https:\/\/github.com\/tensorflow\/models\/blob\/v1.9.0\/tutorials\/image\/mnist\/convolutional.py"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2988765"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3278504"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2885519"},{"key":"e_1_3_2_1_73_1","unstructured":"Zama-AI. 2022. Concrete Operates oN Cyphertexts Rapidly by Extending TfhE. https:\/\/github.com\/zama-ai\/concrete"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507737","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:40Z","timestamp":1750191100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507737"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":68,"alternative-id":["10.1145\/3503222.3507737","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507737","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}