{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:17:07Z","timestamp":1755998227242,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"3IA C\u00f4te d\u00f0Azur","award":["ANR19-P3IA-0002"],"award-info":[{"award-number":["ANR19-P3IA-0002"]}]},{"name":"Grant Agency of CTU in Prague","award":["SGS21\/160\/OHK3\/3T\/13"],"award-info":[{"award-number":["SGS21\/160\/OHK3\/3T\/13"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511527","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"288-299","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Parallel Operations over TFHE-Encrypted Multi-Digit Integers"],"prefix":"10.1145","author":[{"given":"Jakub","family":"Klemsa","sequence":"first","affiliation":[{"name":"CTU in Prague &amp; EURECOM, Sophia-Antipolis, France"}]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia-Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_19"},{"key":"e_1_3_2_1_2_1","unstructured":"Martin R Albrecht Benjamin R Curtis Amit Deo Alex Davidson Rachel Player Eamonn W Postlethwaite Fernando Virdia and Thomas Wunderer. 2018b. LWE Estimator . https:\/\/bitbucket.org\/malb\/lwe-estimator .  Martin R Albrecht Benjamin R Curtis Amit Deo Alex Davidson Rachel Player Eamonn W Postlethwaite Fernando Virdia and Thomas Wunderer. 2018b. LWE Estimator . https:\/\/bitbucket.org\/malb\/lwe-estimator ."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1961.5219227"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Bourse Florian","key":"e_1_3_2_1_5_1","unstructured":"Florian Bourse , Olivier Sanders , and Jacques Traor\u00e9 . 2020. Improved secure integer comparison via homomorphic encryption . In Cryptographers' Track at the RSA Conference . Springer , 391--416. Florian Bourse, Olivier Sanders, and Jacques Traor\u00e9. 2020. Improved secure integer comparison via homomorphic encryption. In Cryptographers' Track at the RSA Conference. Springer, 391--416."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"volume-title":"Cryptographers' Track at the RSA Conference","author":"Carpov Sergiu","key":"e_1_3_2_1_7_1","unstructured":"Sergiu Carpov , Malika Izabach\u00e8ne , and Victor Mollimard . 2019. New techniques for multi-value input homomorphic evaluation and applications . In Cryptographers' Track at the RSA Conference . Springer , 106--126. Sergiu Carpov, Malika Izabach\u00e8ne, and Victor Mollimard. 2019. New techniques for multi-value input homomorphic evaluation and applications. In Cryptographers' Track at the RSA Conference. Springer, 106--126."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_10_1","first-page":"91","article-title":"a. Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks","volume":"2021","author":"Chillotti Ilaria","year":"2021","unstructured":"Ilaria Chillotti , Marc Joye , and Pascal Paillier . 2021 a. Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks . IACR Cryptol. ePrint Arch. , Vol. 2021 (2021), 91 . Ilaria Chillotti, Marc Joye, and Pascal Paillier. 2021 a. Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks. IACR Cryptol. ePrint Arch. , Vol. 2021 (2021), 91.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARITH.1978.6155767"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"e_1_3_2_1_14_1","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","volume":"2012","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012 . Somewhat practical fully homomorphic encryption . IACR Cryptol. ePrint Arch. , Vol. 2012 (2012), 144 . Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. , Vol. 2012 (2012), 144.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_17_1","volume-title":"International Conference on Machine Learning . PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning . PMLR, 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning . PMLR, 201--210."},{"key":"e_1_3_2_1_18_1","volume-title":"Revisiting the functional bootstrap in TFHE. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Antonio Guimar","year":"2021","unstructured":"Antonio Guimar aes, Edson Borin , and Diego F Aranha . 2021. Revisiting the functional bootstrap in TFHE. IACR Transactions on Cryptographic Hardware and Embedded Systems ( 2021 ), 229--253. Antonio Guimar aes, Edson Borin, and Diego F Aranha. 2021. Revisiting the functional bootstrap in TFHE. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 229--253."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31578-8_2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MECO49872.2020.9134331"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/786449.786578"},{"key":"e_1_3_2_1_23_1","volume-title":"She: A fast and accurate deep neural network for encrypted data. arXiv preprint arXiv:1906.00148","author":"Lou Qian","year":"2019","unstructured":"Qian Lou and Lei Jiang . 2019 . She: A fast and accurate deep neural network for encrypted data. arXiv preprint arXiv:1906.00148 (2019). Qian Lou and Lei Jiang. 2019. She: A fast and accurate deep neural network for encrypted data. arXiv preprint arXiv:1906.00148 (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 3--19","author":"Mansouri Mohamad","year":"2019","unstructured":"Mohamad Mansouri , Beyza Bozdemir , Melek \u00d6nen , and Orhan Ermis . 2019 . PAC: privacy-preserving arrhythmia classification with neural networks . In International Symposium on Foundations and Practice of Security. Springer, 3--19 . Mohamad Mansouri, Beyza Bozdemir, Melek \u00d6nen, and Orhan Ermis. 2019. PAC: privacy-preserving arrhythmia classification with neural networks. In International Symposium on Foundations and Practice of Security. Springer, 3--19."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud-EdgeCom49738.2020.00035"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511527","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:40Z","timestamp":1750188640000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511527"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":24,"alternative-id":["10.1145\/3508398.3511527","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511527","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}