{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T13:09:59Z","timestamp":1765112999373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3590344","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Implementing and Optimizing Matrix Triples with Homomorphic\u00a0Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0839-058X","authenticated-orcid":false,"given":"Johannes","family":"Mono","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3293-4989","authenticated-orcid":false,"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany and DFKI GmbH, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch","author":"Albrecht R.","year":"2019","unstructured":"Martin\u00a0 R. Albrecht , Melissa Chase , Hao Chen , Jintai Ding , Shafi Goldwasser , Sergey Gorbunov , Shai Halevi , Jeffrey Hoffstein , Kim Laine , Kristin\u00a0 E. Lauter , Satya Lokam , Daniele Micciancio , Dustin Moody , Travis Morrison , Amit Sahai , and Vinod Vaikuntanathan . 2019. Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch . 2019 , 939 (2019). https:\/\/eprint.iacr.org\/2019\/939 Martin\u00a0R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin\u00a0E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, and Vinod Vaikuntanathan. 2019. Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019, 939 (2019). https:\/\/eprint.iacr.org\/2019\/939"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_2_3_1","volume-title":"Smart","author":"Baum Carsten","year":"2019","unstructured":"Carsten Baum , Daniele Cozzo , and Nigel\u00a0 P. Smart . 2019 . Using TopGear in Overdrive : A More Efficient ZKPoK for SPDZ. In Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a011959), Kenneth\u00a0G. Paterson and Douglas Stebila (Eds.). Springer , 274\u2013302. https:\/\/doi.org\/10.1007\/978-3-030-38471-5_12 10.1007\/978-3-030-38471-5_12 Carsten Baum, Daniele Cozzo, and Nigel\u00a0P. Smart. 2019. Using TopGear in Overdrive: A More Efficient ZKPoK for SPDZ. In Selected Areas in Cryptography - SAC 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers(Lecture Notes in Computer Science, Vol.\u00a011959), Kenneth\u00a0G. Paterson and Douglas Stebila (Eds.). Springer, 274\u2013302. https:\/\/doi.org\/10.1007\/978-3-030-38471-5_12"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_2"},{"key":"e_1_3_2_2_6_1","volume-title":"RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09610)","author":"Costache Ana","year":"2016","unstructured":"Ana Costache and Nigel\u00a0 P. Smart . 2016 . Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?. In Topics in Cryptology - CT-RSA 2016 - The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09610) , Kazue Sako (Ed.). Springer, 325\u2013340. https:\/\/doi.org\/10.1007\/978-3-319-29485-8_19 10.1007\/978-3-319-29485-8_19 Ana Costache and Nigel\u00a0P. Smart. 2016. Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?. In Topics in Cryptology - CT-RSA 2016 - The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings(Lecture Notes in Computer Science, Vol.\u00a09610), Kazue Sako (Ed.). Springer, 325\u2013340. https:\/\/doi.org\/10.1007\/978-3-319-29485-8_19"},{"key":"e_1_3_2_2_7_1","volume-title":"USA","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd , Valerio Pastro , Nigel\u00a0 P. Smart , and Sarah Zakarias . 2012 . Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA , USA , August 19-23, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07417), Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer, 643\u2013662. https:\/\/doi.org\/10.1007\/978-3-642-3 2009-5_38 10.1007\/978-3-642-32009-5_38 Ivan Damg\u00e5rd, Valerio Pastro, Nigel\u00a0P. Smart, and Sarah Zakarias. 2012. Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07417), Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer, 643\u2013662. https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_2_8_1","volume-title":"Does Fully Homomorphic Encryption Need Compute Acceleration?IACR Cryptol. ePrint Arch","author":"de Castro Leo","year":"2021","unstructured":"Leo de Castro , Rashmi Agrawal , Rabia\u00a0Tugce Yazicigil , Anantha\u00a0 P. Chandrakasan , Vinod Vaikuntanathan , Chiraag Juvekar , and Ajay Joshi . 2021. Does Fully Homomorphic Encryption Need Compute Acceleration?IACR Cryptol. ePrint Arch . 2021 , 1636 (2021). https:\/\/eprint.iacr.org\/2021\/1636 Leo de Castro, Rashmi Agrawal, Rabia\u00a0Tugce Yazicigil, Anantha\u00a0P. Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, and Ajay Joshi. 2021. Does Fully Homomorphic Encryption Need Compute Acceleration?IACR Cryptol. ePrint Arch. 2021, 1636 (2021). https:\/\/eprint.iacr.org\/2021\/1636"},{"key":"e_1_3_2_2_9_1","volume-title":"54th Annual IEEE\/ACM International Symposium on Microarchitecture","author":"Feldmann Axel","year":"2021","unstructured":"Axel Feldmann , Nikola Samardzic , Aleksandar Krastev , Srinivas Devadas , Ronald\u00a0 G. Dreslinski , Christopher Peikert , and Daniel S\u00e1nchez . 2021 . F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption. In MICRO \u201921 : 54th Annual IEEE\/ACM International Symposium on Microarchitecture , Virtual Event, Greece , October 18-22, 2021. ACM, 238\u2013252. https:\/\/doi.org\/10.1145\/3466752.3480070 10.1145\/3466752.3480070 Axel Feldmann, Nikola Samardzic, Aleksandar Krastev, Srinivas Devadas, Ronald\u00a0G. Dreslinski, Christopher Peikert, and Daniel S\u00e1nchez. 2021. F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption. In MICRO \u201921: 54th Annual IEEE\/ACM International Symposium on Microarchitecture, Virtual Event, Greece, October 18-22, 2021. ACM, 238\u2013252. https:\/\/doi.org\/10.1145\/3466752.3480070"},{"key":"e_1_3_2_2_10_1","volume-title":"BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch.","author":"Geelen Robin","year":"2022","unstructured":"Robin Geelen , Michiel\u00a0Van Beirendonck , Hilder V.\u00a0L. Pereira , Brian Huffman , Tynan McAuley , Ben Selfridge , Daniel Wagner , Georgios Dimou , Ingrid Verbauwhede , Frederik Vercauteren , and David\u00a0 W. Archer . 2022 . BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022, 657 (2022). https:\/\/eprint.iacr.org\/2022\/657 Robin Geelen, Michiel\u00a0Van Beirendonck, Hilder V.\u00a0L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, and David\u00a0W. Archer. 2022. BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2022, 657 (2022). https:\/\/eprint.iacr.org\/2022\/657"},{"key":"e_1_3_2_2_11_1","volume-title":"USA","author":"Gentry Craig","year":"2012","unstructured":"Craig Gentry , Shai Halevi , and Nigel\u00a0 P. Smart . 2012 . Homomorphic Evaluation of the AES Circuit. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA , USA , August 19-23, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07417), Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer, 850\u2013867. https:\/\/doi.org\/10.1007\/978-3-642-3 2009-5_49 10.1007\/978-3-642-32009-5_49 Craig Gentry, Shai Halevi, and Nigel\u00a0P. Smart. 2012. Homomorphic Evaluation of the AES Circuit. In Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings(Lecture Notes in Computer Science, Vol.\u00a07417), Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer, 850\u2013867. https:\/\/doi.org\/10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_2_12_1","volume-title":"Optimizing Homomorphic Encryption Parameters for Arbitrary Applications. IACR Cryptol. ePrint Arch","author":"Gouert Charles","year":"2022","unstructured":"Charles Gouert , Rishi Khan , and Nektarios\u00a0Georgios Tsoutsos . 2022. Optimizing Homomorphic Encryption Parameters for Arbitrary Applications. IACR Cryptol. ePrint Arch . 2022 , 575 (2022). https:\/\/eprint.iacr.org\/2022\/575 Charles Gouert, Rishi Khan, and Nektarios\u00a0Georgios Tsoutsos. 2022. Optimizing Homomorphic Encryption Parameters for Arbitrary Applications. IACR Cryptol. ePrint Arch. 2022, 575 (2022). https:\/\/eprint.iacr.org\/2022\/575"},{"key":"e_1_3_2_2_13_1","volume-title":"USA","author":"Halevi Shai","year":"2014","unstructured":"Shai Halevi and Victor Shoup . 2014 . Algorithms in HElib. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA , USA , August 17-21, 2014, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a08616), Juan\u00a0A. Garay and Rosario Gennaro (Eds.). Springer, 554\u2013571. https:\/\/doi.org\/10.1007\/978-3-662-44371-2_31 10.1007\/978-3-662-44371-2_31 Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a08616), Juan\u00a0A. Garay and Rosario Gennaro (Eds.). Springer, 554\u2013571. https:\/\/doi.org\/10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_2_14_1","volume-title":"USA","author":"Halevi Shai","year":"2018","unstructured":"Shai Halevi and Victor Shoup . 2018 . Faster Homomorphic Linear Transformations in HElib. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA , USA , August 19-23, 2018, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a010991), Hovav Shacham and Alexandra Boldyreva (Eds.). Springer, 93\u2013120. https:\/\/doi.org\/10.1007\/978-3-319-96884-1_4 10.1007\/978-3-319-96884-1_4 Shai Halevi and Victor Shoup. 2018. Faster Homomorphic Linear Transformations in HElib. In Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a010991), Hovav Shacham and Alexandra Boldyreva (Eds.). Springer, 93\u2013120. https:\/\/doi.org\/10.1007\/978-3-319-96884-1_4"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_2_17_1","volume-title":"Finding and Evaluating Parameters for BGV. IACR Cryptol. ePrint Arch","author":"Mono Johannes","year":"2022","unstructured":"Johannes Mono , Chiara Marcolla , Georg Land , Tim G\u00fcneysu , and Najwa Aaraj . 2022. Finding and Evaluating Parameters for BGV. IACR Cryptol. ePrint Arch . 2022 , 706 (2022). https:\/\/eprint.iacr.org\/2022\/706 Johannes Mono, Chiara Marcolla, Georg Land, Tim G\u00fcneysu, and Najwa Aaraj. 2022. Finding and Evaluating Parameters for BGV. IACR Cryptol. ePrint Arch. 2022, 706 (2022). https:\/\/eprint.iacr.org\/2022\/706"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09416-w"},{"key":"e_1_3_2_2_19_1","volume-title":"Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch","author":"Seiler Gregor","year":"2018","unstructured":"Gregor Seiler . 2018. Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch . 2018 , 39 (2018). http:\/\/eprint.iacr.org\/2018\/039 Gregor Seiler. 2018. Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. IACR Cryptol. ePrint Arch. 2018, 39 (2018). http:\/\/eprint.iacr.org\/2018\/039"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3590344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:16Z","timestamp":1750183696000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3590344"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":20,"alternative-id":["10.1145\/3579856.3590344","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3590344","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}