{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T18:16:09Z","timestamp":1775844969981,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589045","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["HAAC: A Hardware-Software Co-Design to Accelerate Garbled Circuits"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9533-8183","authenticated-orcid":false,"given":"Jianqiao","family":"Mo","sequence":"first","affiliation":[{"name":"New York University, New York, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8137-1250","authenticated-orcid":false,"given":"Jayanth","family":"Gopinath","sequence":"additional","affiliation":[{"name":"New York University, New York, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1932-2750","authenticated-orcid":false,"given":"Brandon","family":"Reagen","sequence":"additional","affiliation":[{"name":"New York University, New York, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"June 12","author":"Akdemir Kahraman","year":"2010","unstructured":"Kahraman Akdemir , Martin Dixon , Wajdi Feghali , Patrick Fay , Vinodh Gopal , Jim Guilford , Erdinc Ozturk , Gil Wolrich , and Ronen Zohar . 2010. Breakthrough AES performance with intel AES new instructions. White paper , June 12 ( 2010 ), 217. Kahraman Akdemir, Martin Dixon, Wajdi Feghali, Patrick Fay, Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, and Ronen Zohar. 2010. Breakthrough AES performance with intel AES new instructions. White paper, June 12 (2010), 217."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Donald Beaver Silvio Micali and Phillip Rogaway. 1990. The Round Complexity of Secure Protocols (Extended Abstract).  Donald Beaver Silvio Micali and Phillip Rogaway. 1990. The Round Complexity of Secure Protocols (Extended Abstract).","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_3_1","volume-title":"Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings 3. Springer, 11--46","author":"Beimel Amos","year":"2011","unstructured":"Amos Beimel . 2011 . Secret-sharing schemes: A survey . In Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings 3. Springer, 11--46 . Amos Beimel. 2011. Secret-sharing schemes: A survey. In Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings 3. Springer, 11--46."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00026"},{"key":"e_1_3_2_1_6_1","volume-title":"Stephen Tu, and Shafi Goldwasser.","author":"Bost Raphael","year":"2014","unstructured":"Raphael Bost , Raluca Ada Popa , Stephen Tu, and Shafi Goldwasser. 2014 . Machine learning classification over encrypted data. Cryptology ePrint Archive ( 2014). Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2014. Machine learning classification over encrypted data. Cryptology ePrint Archive (2014)."},{"key":"e_1_3_2_1_7_1","volume-title":"ACM Transactions on Computation Theory","author":"Brakerski Zvika","year":"2014","unstructured":"Zvika Brakerski , Craig Gentry , and Vinod Vaikuntanathan . 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory ( 2014 ). Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2014. (Leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (2014)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576779.2576783"},{"key":"e_1_3_2_1_9_1","unstructured":"Crucial by Micron Technology Inc. 2023. Ram Memory Speeds and Compatibility. https:\/\/www.crucial.com\/support\/memory-speeds-compatability  Crucial by Micron Technology Inc. 2023. Ram Memory Speeds and Compatibility. https:\/\/www.crucial.com\/support\/memory-speeds-compatability"},{"key":"e_1_3_2_1_10_1","unstructured":"Brent Carmer Alex J Malozemoff and Marc Rosen. 2019. swanky: A suite of rust libraries for secure multi-party computation. https:\/\/github.com\/GaloisInc\/swanky.  Brent Carmer Alex J Malozemoff and Marc Rosen. 2019. swanky: A suite of rust libraries for secure multi-party computation. https:\/\/github.com\/GaloisInc\/swanky."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_12_1","volume-title":"TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology","author":"Chillotti Ilaria","year":"2020","unstructured":"Ilaria Chillotti , Nicolas Gama , Mariya Georgieva , and Malika Izabach\u00e8ne . 2020. TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology ( 2020 ). Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach\u00e8ne. 2020. TFHE: fast fully homomorphic encryption over the torus. Journal of Cryptology (2020)."},{"key":"e_1_3_2_1_13_1","unstructured":"W Dai. 2018. CUDA-accelerated Fully Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuFHE.  W Dai. 2018. CUDA-accelerated Fully Homomorphic Encryption Library. https:\/\/github.com\/vernamlab\/cuFHE."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/product.statnano.com\/product\/6775\/16ff-(finfet-plus)","author":"Database Nanotechnology Products","year":"2023","unstructured":"Nanotechnology Products Database . 2023. TSMC 16FF+ (FinFET Plus). ( 2023 ). https:\/\/product.statnano.com\/product\/6775\/16ff-(finfet-plus) Nanotechnology Products Database. 2023. TSMC 16FF+ (FinFET Plus). (2023). https:\/\/product.statnano.com\/product\/6775\/16ff-(finfet-plus)"},{"key":"e_1_3_2_1_15_1","unstructured":"Nanotechnology Products Database. 2023. TSMC 20nm Technology. (2023). https:\/\/product.statnano.com\/product\/6776\/tsmc20nm-technology  Nanotechnology Products Database. 2023. TSMC 20nm Technology. (2023). https:\/\/product.statnano.com\/product\/6776\/tsmc20nm-technology"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_17_1","volume-title":"Innovus Implementation System claims up to 10\u00d7 turnaround time reduction. Ic Design Synthesis Soc","author":"Dunn Michael","year":"2015","unstructured":"Michael Dunn . 2015. Innovus Implementation System claims up to 10\u00d7 turnaround time reduction. Ic Design Synthesis Soc ( 2015 ). Michael Dunn. 2015. Innovus Implementation System claims up to 10\u00d7 turnaround time reduction. Ic Design Synthesis Soc (2015)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_1_19_1","volume-title":"Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren . 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive ( 2012 ). Junfeng Fan and Frederik Vercauteren. 2012. Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive (2012)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020078.3021746"},{"key":"e_1_3_2_1_21_1","unstructured":"Axel Feldmann Nikola Samardzic Aleksandar Krastev Srini Devadas Ron Dreslinski Karim Eldefrawy Nicholas Genise Chris Peikert and Daniel Sanchez. 2021. F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version). arXiv:2109.05371 [cs.CR]  Axel Feldmann Nikola Samardzic Aleksandar Krastev Srini Devadas Ron Dreslinski Karim Eldefrawy Nicholas Genise Chris Peikert and Daniel Sanchez. 2021. F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version). arXiv:2109.05371 [cs.CR]"},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Security and Cryptography for Networks. Springer, 358--379","author":"Frederiksen Tore Kasper","year":"2014","unstructured":"Tore Kasper Frederiksen , Thomas P Jakobsen , and Jesper Buus Nielsen . 2014 . Faster maliciously secure two-party computation using the GPU . In International Conference on Security and Cryptography for Networks. Springer, 358--379 . Tore Kasper Frederiksen, Thomas P Jakobsen, and Jesper Buus Nielsen. 2014. Faster maliciously secure two-party computation using the GPU. In International Conference on Security and Cryptography for Networks. Springer, 358--379."},{"key":"e_1_3_2_1_23_1","volume-title":"Siddharth Garg, and Brandon Reagen.","author":"Garimella Karthik","year":"2022","unstructured":"Karthik Garimella , Zahra Ghodsi , Nandan Kumar Jha , Siddharth Garg, and Brandon Reagen. 2022 . Characterizing and Optimizing End-to-End Systems for Private Inference . arXiv preprint arXiv:2207.07177 (2022). Karthik Garimella, Zahra Ghodsi, Nandan Kumar Jha, Siddharth Garg, and Brandon Reagen. 2022. Characterizing and Optimizing End-to-End Systems for Private Inference. arXiv preprint arXiv:2207.07177 (2022)."},{"key":"e_1_3_2_1_24_1","unstructured":"Zahra Ghodsi Akshaj Veldanda Brandon Reagen and Siddharth Garg. 2021. CryptoNAS: Private Inference on a ReLU Budget. arXiv:2006.08733 [cs.LG]  Zahra Ghodsi Akshaj Veldanda Brandon Reagen and Siddharth Garg. 2021. CryptoNAS: Private Inference on a ReLU Budget. arXiv:2006.08733 [cs.LG]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2641361.2641363","article-title":"The Mill: split-stream encoding","volume":"41","author":"Godard Ivan","year":"2014","unstructured":"Ivan Godard . 2014 . The Mill: split-stream encoding . ACM SIGARCH Computer Architecture News 41 , 5 (2014), 1 -- 5 . Ivan Godard. 2014. The Mill: split-stream encoding. ACM SIGARCH Computer Architecture News 41, 5 (2014), 1--5.","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. the Nineteenth Annual ACM STOC'87","author":"Goldwasser Shafi","year":"1987","unstructured":"Shafi Goldwasser . 1987 . How to play any mental game, or a completeness theorem for protocols with an honest majority . Proc. the Nineteenth Annual ACM STOC'87 (1987), 218--229. Shafi Goldwasser. 1987. How to play any mental game, or a completeness theorem for protocols with an honest majority. Proc. the Nineteenth Annual ACM STOC'87 (1987), 218--229."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813619"},{"key":"e_1_3_2_1_28_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Guo Chun","year":"2020","unstructured":"Chun Guo , Jonathan Katz , Xiao Wang , Chenkai Weng , and Yu Yu. 2020. Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting) . In Advances in Cryptology - CRYPTO 2020 , Daniele Micciancio and Thomas Ristenpart (Eds.). Springer International Publishing , Cham, 793--822. Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, and Yu Yu. 2020. Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting). In Advances in Cryptology - CRYPTO 2020, Daniele Micciancio and Thomas Ristenpart (Eds.). Springer International Publishing, Cham, 793--822."},{"key":"e_1_3_2_1_29_1","volume-title":"SoK: General-Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP).","author":"Hastings Marcella","year":"2019","unstructured":"Marcella Hastings , Brett Hemenway , Daniel Noble , and Steve Zdancewic . 2019 . SoK: General-Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP). Marcella Hastings, Brett Hemenway, Daniel Noble, and Steve Zdancewic. 2019. SoK: General-Purpose Compilers for Secure Multi-Party Computation. In 2019 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_30_1","volume-title":"Homomorphically Encrypted Computation using Stochastic Encodings. arXiv preprint arXiv:2203.02547","author":"Hsiao Hsuan","year":"2022","unstructured":"Hsuan Hsiao , Vincent Lee , Brandon Reagen , and Armin Alaghi . 2022. Homomorphically Encrypted Computation using Stochastic Encodings. arXiv preprint arXiv:2203.02547 ( 2022 ). Hsuan Hsiao, Vincent Lee, Brandon Reagen, and Armin Alaghi. 2022. Homomorphically Encrypted Computation using Stochastic Encodings. arXiv preprint arXiv:2203.02547 (2022)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2019.8916407"},{"key":"e_1_3_2_1_32_1","volume-title":"Faster secure two-party computation using garbled circuits","author":"Huang Yan","unstructured":"Yan Huang , David Evans , Jonathan Katz , and Lior Malka . 2011. Faster secure two-party computation using garbled circuits , Vol. 8 . 35--35. Yan Huang, David Evans, Jonathan Katz, and Lior Malka. 2011. Faster secure two-party computation using garbled circuits, Vol. 8. 35--35."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2019.00045"},{"key":"e_1_3_2_1_34_1","volume-title":"MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers. 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC)","author":"Hussain Siam Umar","year":"2018","unstructured":"Siam Umar Hussain , Bita Darvish Rouhani , Mohammad Ghasemzadeh , and Farinaz Koushanfar . 2018 . MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers. 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC) (2018), 1--6. Siam Umar Hussain, Bita Darvish Rouhani, Mohammad Ghasemzadeh, and Farinaz Koushanfar. 2018. MAXelerator: FPGA Accelerator for Privacy Preserving Multiply-Accumulate (MAC) on Cloud Servers. 2018 55th ACM\/ESDA\/IEEE Design Automation Conference (DAC) (2018), 1--6."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523681"},{"key":"e_1_3_2_1_36_1","unstructured":"hwinfo. 2021. Free system information monitoring and Diagnostics. https:\/\/www.hwinfo.com\/  hwinfo. 2021. Free system information monitoring and Diagnostics. https:\/\/www.hwinfo.com\/"},{"key":"e_1_3_2_1_37_1","unstructured":"Flex Logix Technologies Inc. 2020. Gen2 TSMC 28HPC\/HPC+\/22ULPEFLX 4K. https:\/\/flex-logix.com\/wp-content\/uploads\/2020\/02\/2020-02-EFLX4K-TSMC28HPCHPC-product-brief.pdf  Flex Logix Technologies Inc. 2020. Gen2 TSMC 28HPC\/HPC+\/22ULPEFLX 4K. https:\/\/flex-logix.com\/wp-content\/uploads\/2020\/02\/2020-02-EFLX4K-TSMC28HPCHPC-product-brief.pdf"},{"key":"e_1_3_2_1_38_1","unstructured":"Xilinx Inc. 2020. Vivado Design Suite User Guide: UG973.  Xilinx Inc. 2020. Vivado Design Suite User Guide: UG973."},{"key":"e_1_3_2_1_39_1","unstructured":"Intel. 2021. High Bandwidth Memory (HBM2) Interface Intel\u00ae FPGA IP User Guide. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683189\/21-3-19-6-1\/  Intel. 2021. High Bandwidth Memory (HBM2) Interface Intel\u00ae FPGA IP User Guide. https:\/\/www.intel.com\/content\/www\/us\/en\/docs\/programmable\/683189\/21-3-19-6-1\/"},{"key":"e_1_3_2_1_40_1","unstructured":"Intel. 2023. Intel\u00ae Core\u2122 I7-10700K processor. https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/products\/199335\/intel-core-i710700k-processor-16m-cache-up-to-5-10-ghz.html  Intel. 2023. Intel\u00ae Core\u2122 I7-10700K processor. https:\/\/ark.intel.com\/content\/www\/us\/en\/ark\/products\/199335\/intel-core-i710700k-processor-16m-cache-up-to-5-10-ghz.html"},{"key":"e_1_3_2_1_41_1","volume-title":"MATCHA: A Fast and Energy-Efficient Accelerator for Fully Homomorphic Encryption over the Torus. arXiv preprint arXiv:2202.08814","author":"Jiang Lei","year":"2022","unstructured":"Lei Jiang , Qian Lou , and Nrushad Joshi . 2022 . MATCHA: A Fast and Energy-Efficient Accelerator for Fully Homomorphic Encryption over the Torus. arXiv preprint arXiv:2202.08814 (2022). Lei Jiang, Qian Lou, and Nrushad Joshi. 2022. MATCHA: A Fast and Energy-Efficient Accelerator for Fully Homomorphic Encryption over the Torus. arXiv preprint arXiv:2202.08814 (2022)."},{"key":"e_1_3_2_1_42_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . {GAZELLE}: A low latency framework for secure neural network inference . In 27th USENIX Security Symposium (USENIX Security 18) . 1651--1669. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. {GAZELLE}: A low latency framework for secure neural network inference. In 27th USENIX Security Symposium (USENIX Security 18). 1651--1669."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_44_1","volume-title":"BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption.","author":"Kim Sangpyo","year":"2021","unstructured":"Sangpyo Kim , Jongmin Kim , Michael Kim , Wonkyung Jung , Minsoo Rhu , John Kim , and Jung Ho Ahn . 2021 . BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption. Sangpyo Kim, Jongmin Kim, Michael Kim, Wonkyung Jung, Minsoo Rhu, John Kim, and Jung Ho Ahn. 2021. BTS: An Accelerator for Bootstrappable Fully Homomorphic Encryption."},{"key":"e_1_3_2_1_45_1","volume-title":"Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12--14, 2009. Proceedings 8. Springer, 1--20","author":"Kolesnikov Vladimir","year":"2009","unstructured":"Vladimir Kolesnikov , Ahmad-Reza Sadeghi , and Thomas Schneider . 2009 . Improved garbled circuit building blocks and applications to auctions and computing minima . In Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12--14, 2009. Proceedings 8. Springer, 1--20 . Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. 2009. Improved garbled circuit building blocks and applications to auctions and computing minima. In Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, December 12--14, 2009. Proceedings 8. Springer, 1--20."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_47_1","volume-title":"MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation.. In OSDI. 367--385.","author":"Kumar Sam","year":"2021","unstructured":"Sam Kumar , David E Culler , and Raluca Ada Popa . 2021 . MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation.. In OSDI. 367--385. Sam Kumar, David E Culler, and Raluca Ada Popa. 2021. MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation.. In OSDI. 367--385."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/H2RC49586.2019.00008"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_1_51_1","unstructured":"Dahlia Malkhi Noam Nisan Benny Pinkas Yaron Sella etal 2004. Fairplay-Secure Two-Party Computation System.. In USENIX security symposium Vol. 4. San Diego CA USA 9.  Dahlia Malkhi Noam Nisan Benny Pinkas Yaron Sella et al. 2004. Fairplay-Secure Two-Party Computation System.. In USENIX security symposium Vol. 4. San Diego CA USA 9."},{"key":"e_1_3_2_1_52_1","unstructured":"Daniele Micciancio and Yuriy Polyakov. 2020. Bootstrapping in FHEW-like Cryptosystems. Cryptology ePrint Archive Paper 2020\/086. https:\/\/eprint.iacr.org\/2020\/086.  Daniele Micciancio and Yuriy Polyakov. 2020. Bootstrapping in FHEW-like Cryptosystems. Cryptology ePrint Archive Paper 2020\/086. https:\/\/eprint.iacr.org\/2020\/086."},{"key":"e_1_3_2_1_53_1","volume-title":"Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra , Ryan Lehmkuhl , Akshayaram Srinivasan , Wenting Zheng , and Raluca Ada Popa . 2020 . Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 2505--2522. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2505--2522. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/mishra"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.20"},{"key":"e_1_3_2_1_56_1","volume-title":"2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 142--153","author":"Morshed Toufique","year":"2020","unstructured":"Toufique Morshed , Md Momin Al Aziz , and Noman Mohammed . 2020 . Cpu and gpu accelerated fully homomorphic encryption . In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 142--153 . Toufique Morshed, Md Momin Al Aziz, and Noman Mohammed. 2020. Cpu and gpu accelerated fully homomorphic encryption. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 142--153."},{"key":"e_1_3_2_1_57_1","volume-title":"Sanjay Saravanan, Shubho Sengupta, and Erik Taubeneck.","author":"Movahedi Mahnush","year":"2021","unstructured":"Mahnush Movahedi , Benjamin M Case , Andrew Knox , James Honaker , Li Li , Yiming Paul Li , Sanjay Saravanan, Shubho Sengupta, and Erik Taubeneck. 2021 . Privacy-preserving randomized controlled trials: A protocol for industry scale deployment. arXiv preprint arXiv:2101.04766 (2021). Mahnush Movahedi, Benjamin M Case, Andrew Knox, James Honaker, Li Li, Yiming Paul Li, Sanjay Saravanan, Shubho Sengupta, and Erik Taubeneck. 2021. Privacy-preserving randomized controlled trials: A protocol for industry scale deployment. arXiv preprint arXiv:2101.04766 (2021)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"e_1_3_2_1_59_1","volume-title":"Performance Optimization of Allreduce Operation for Multi-GPU Systems. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 3107--3112","author":"Nukada Akira","year":"2021","unstructured":"Akira Nukada . 2021 . Performance Optimization of Allreduce Operation for Multi-GPU Systems. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 3107--3112 . Akira Nukada. 2021. Performance Optimization of Allreduce Operation for Multi-GPU Systems. In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 3107--3112."},{"key":"e_1_3_2_1_60_1","unstructured":"NVIDIA. 2021. NVIDIA DGX Station A100 System Architecture. https:\/\/images.nvidia.com\/aem-dam\/Solutions\/Data-Center\/nvidia-dgx-station-a100-system-architecture-white-paper.pdf  NVIDIA. 2021. NVIDIA DGX Station A100 System Architecture. https:\/\/images.nvidia.com\/aem-dam\/Solutions\/Data-Center\/nvidia-dgx-station-a100-system-architecture-white-paper.pdf"},{"key":"e_1_3_2_1_61_1","volume-title":"Smart, and Stephen C. Williams","author":"Pinkas Benny","year":"2009","unstructured":"Benny Pinkas , Thomas Schneider , Nigel P. Smart, and Stephen C. Williams . 2009 . Secure Two-Party Computation Is Practical. In Advances in Cryptology - ASIACRYPT 2009, Mitsuru Matsui (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg, 250--267. Benny Pinkas, Thomas Schneider, Nigel P. Smart, and Stephen C. Williams. 2009. Secure Two-Party Computation Is Practical. In Advances in Cryptology - ASIACRYPT 2009, Mitsuru Matsui (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 250--267."},{"key":"e_1_3_2_1_62_1","first-page":"97","article-title":"Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture","volume":"2011","author":"Pu Shi","year":"2011","unstructured":"Shi Pu , Pu Duan , and Jyh-Charn S. Liu . 2011 . Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture . IACR Cryptol. ePrint Arch. 2011 (2011), 97 . Shi Pu, Pu Duan, and Jyh-Charn S. Liu. 2011. Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. IACR Cryptol. ePrint Arch. 2011 (2011), 97.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_63_1","volume-title":"Computing privacy-preserving edit distance and Smith-Waterman problems on the GPU architecture. Cryptology ePrint Archive","author":"Pu Shi","year":"2013","unstructured":"Shi Pu and Jyh-Charn Liu . 2013. Computing privacy-preserving edit distance and Smith-Waterman problems on the GPU architecture. Cryptology ePrint Archive ( 2013 ). Shi Pu and Jyh-Charn Liu. 2013. Computing privacy-preserving edit distance and Smith-Waterman problems on the GPU architecture. Cryptology ePrint Archive (2013)."},{"key":"e_1_3_2_1_64_1","unstructured":"Rambus. 2020. White paper: HBM2E and GDDR6: Memory solutions for AI. https:\/\/go.rambus.com\/hbm2e-gddr6-memory-solutions-for-ai  Rambus. 2020. White paper: HBM2E and GDDR6: Memory solutions for AI. https:\/\/go.rambus.com\/hbm2e-gddr6-memory-solutions-for-ai"},{"key":"e_1_3_2_1_65_1","volume-title":"2018 28th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 16--164","author":"Ravishankar Chirag","year":"2018","unstructured":"Chirag Ravishankar , Dinesh Gaitonde , and Trevor Bauer . 2018 . Placement strategies for 2.5 D FPGA fabric architectures . In 2018 28th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 16--164 . Chirag Ravishankar, Dinesh Gaitonde, and Trevor Bauer. 2018. Placement strategies for 2.5 D FPGA fabric architectures. In 2018 28th International Conference on Field Programmable Logic and Applications (FPL). IEEE, 16--164."},{"key":"e_1_3_2_1_66_1","volume-title":"Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference. arXiv:2006.00505 [cs.CR]","author":"Reagen Brandon","year":"2020","unstructured":"Brandon Reagen , Wooseok Choi , Yeongil Ko , Vincent Lee , Gu-Yeon Wei , Hsien-Hsin S. Lee , and David Brooks . 2020 . Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference. arXiv:2006.00505 [cs.CR] Brandon Reagen, Wooseok Choi, Yeongil Ko, Vincent Lee, Gu-Yeon Wei, Hsien-Hsin S. Lee, and David Brooks. 2020. Cheetah: Optimizing and Accelerating Homomorphic Encryption for Private Inference. arXiv:2006.00505 [cs.CR]"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"e_1_3_2_1_70_1","unstructured":"Aditya Shastri David Wu Lynn Chua Ruiyu Zhu Tal Davidi Yu Sheng and Josh Mintz. 2022. Private Computation Framework 2.0. https:\/\/research.facebook.com\/publications\/private-computation-framework-2-0\/.  Aditya Shastri David Wu Lynn Chua Ruiyu Zhu Tal Davidi Yu Sheng and Josh Mintz. 2022. Private Computation Framework 2.0. https:\/\/research.facebook.com\/publications\/private-computation-framework-2-0\/."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00052"},{"key":"e_1_3_2_1_72_1","volume-title":"2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC)","author":"Songhori Ebrahim M.","year":"2016","unstructured":"Ebrahim M. Songhori , Shaza Zeitouni , Ghada Dessouky , T. Schneider , Ahmad-Reza Sadeghi , and Farinaz Koushanfar . 2016 . GarbledCPU: A MIPS processor for secure computation in hardware . 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC) (2016), 1--6. Ebrahim M. Songhori, Shaza Zeitouni, Ghada Dessouky, T. Schneider, Ahmad-Reza Sadeghi, and Farinaz Koushanfar. 2016. GarbledCPU: A MIPS processor for secure computation in hardware. 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC) (2016), 1--6."},{"key":"e_1_3_2_1_73_1","volume-title":"Synopsys Synthesis Installation Notes Version T-2022.03 (March","year":"2022","unstructured":"Synopsys. 2022. Synopsys Synthesis Installation Notes Version T-2022.03 (March 2022 ). https:\/\/solvnet.synopsys.com\/Install\/installation_guide.jsp?id=212&releasedate=2022-03-07 Synopsys. 2022. Synopsys Synthesis Installation Notes Version T-2022.03 (March 2022). https:\/\/solvnet.synopsys.com\/Install\/installation_guide.jsp?id=212&releasedate=2022-03-07"},{"key":"e_1_3_2_1_74_1","unstructured":"Stefan Tillich and Nigel Smart. 2016. Circuits of basic functions suitable for MPC and FHE.  Stefan Tillich and Nigel Smart. 2016. Circuits of basic functions suitable for MPC and FHE."},{"key":"e_1_3_2_1_75_1","unstructured":"TSMC. 2023. TSMC N28HPC memory compiler installation guide. https:\/\/usermanual.wiki\/Pdf\/ANN28HPCCompilerInstallationGuideV1.1016164337.pdf  TSMC. 2023. TSMC N28HPC memory compiler installation guide. https:\/\/usermanual.wiki\/Pdf\/ANN28HPCCompilerInstallationGuideV1.1016164337.pdf"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507737"},{"key":"e_1_3_2_1_77_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit.  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit."},{"key":"e_1_3_2_1_78_1","volume-title":"27th Annual Symposium on Foundations of Computer Science (sfcs","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to generate and exchange secrets . In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). 162--167. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). 162--167."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Samee Zahur Mike Rosulek and David Evans. 2015. Two Halves Make a Whole. (2015).  Samee Zahur Mike Rosulek and David Evans. 2015. Two Halves Make a Whole. (2015).","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Ruiyu Zhu Changchang Ding and Yan Huang. 2019. Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. (2019).  Ruiyu Zhu Changchang Ding and Yan Huang. 2019. Efficient Publicly Verifiable 2PC over a Blockchain with Applications to Financially-Secure Computations. (2019).","DOI":"10.1145\/3319535.3363215"}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","location":"Orlando FL USA","acronym":"ISCA '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"]},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:38Z","timestamp":1750178798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589045"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":80,"alternative-id":["10.1145\/3579371.3589045","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589045","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}