{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:54:43Z","timestamp":1773194083206,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR0011-21-3-0003"],"award-info":[{"award-number":["HR0011-21-3-0003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3605759.3625257","type":"proceedings-article","created":{"date-parts":[[2023,11,22]],"date-time":"2023-11-22T22:55:48Z","timestamp":1700693748000},"page":"23-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9461-0170","authenticated-orcid":false,"given":"Rashmi","family":"Agrawal","sequence":"first","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1733-1394","authenticated-orcid":false,"given":"Jung Ho","family":"Ahn","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1108-0512","authenticated-orcid":false,"given":"Flavio","family":"Bergamaschi","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2965-8987","authenticated-orcid":false,"given":"Ro","family":"Cammarota","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-2220","authenticated-orcid":false,"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[{"name":"Seoul National University &amp; CryptoLab Inc., Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5072-6828","authenticated-orcid":false,"given":"Fillipe","family":"D. M. de Souza","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8284-6795","authenticated-orcid":false,"given":"Huijing","family":"Gong","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2125-5043","authenticated-orcid":false,"given":"Minsik","family":"Kang","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4766-3456","authenticated-orcid":false,"given":"Duhyeong","family":"Kim","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2937-3073","authenticated-orcid":false,"given":"Jongmin","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3080-2680","authenticated-orcid":false,"given":"Hubert","family":"de Lassus","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5401-8949","authenticated-orcid":false,"given":"Jai Hyun","family":"Park","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9543-567X","authenticated-orcid":false,"given":"Michael","family":"Steiner","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3019-2336","authenticated-orcid":false,"given":"Wen","family":"Wang","sequence":"additional","affiliation":[{"name":"Intel Labs, Santa Clara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2019.2902799"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560696"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--69453--5_23"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--48329--2_16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--77870--5_21"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09234-3_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--17656--3_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_12_1","volume-title":"Selected Areas in Cryptography--SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. 2019. A full RNS variant of approximate homomorphic encryption. In Selected Areas in Cryptography--SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15--17, 2018, Revised Selected Papers 25. Springer, 347--368."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_14_1","volume-title":"Does fully homomorphic encryption need compute acceleration? arXiv preprint arXiv:2112.06396","author":"de Castro Leo","year":"2021","unstructured":"Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, and Ajay Joshi. 2021. Does fully homomorphic encryption need compute acceleration? arXiv preprint arXiv:2112.06396 (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_1_17_1","volume-title":"International conference on machine learning. PMLR, 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International conference on machine learning. PMLR, 201--210."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"e_1_3_2_1_19_1","unstructured":"Ian Quah and Ahmad Al Badawi and David Bruce Cousins and Yuriy Polyakov. 2023. OpenFHE-Based Examples of Logistic Regression Training using Nesterov Accelerated Gradient Descent. https:\/\/github.com\/openfheorg\/openfhe-logreg-training-examples. (2023). Accessed: 2023-07--23."},{"key":"e_1_3_2_1_20_1","unstructured":"David Ireland. 2001. Google. https:\/\/code.google.com\/archive\/p\/libmcrypto\/. (2001)."},{"key":"e_1_3_2_1_21_1","volume-title":"Jung Hee Cheon, and Younho Lee.","author":"Jung Wonkyung","year":"2021","unstructured":"Wonkyung Jung, Sangpyo Kim, Jung Ho Ahn, Jung Hee Cheon, and Younho Lee. 2021. Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 114--148."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings. Springer, 120--144","author":"Kim Andrey","year":"2022","unstructured":"Andrey Kim, Antonis Papadimitriou, and Yuriy Polyakov. 2022c. Approximate homomorphic encryption with reduced approximation error. In Topics in Cryptology--CT-RSA 2022: Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1--2, 2022, Proceedings. Springer, 120--144."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 39th International Conference on Machine Learning","volume":"162","author":"Lee Eunsang","year":"2022","unstructured":"Eunsang Lee, Joon-Woo Lee, Junghyun Lee, Young-Sik Kim, Yongjune Kim, Jong-Seon No, and Woosuk Choi. 2022. Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions. In Proceedings of the 39th International Conference on Machine Learning, Vol. 162. PMLR, 12403--12422."},{"key":"e_1_3_2_1_27_1","unstructured":"Xinyi Li Masaki Nishi Teppei Shishido and Keiji Kimura. 2022. Acceleration of HE-Transformer with bit reduced SEAL and HEXL. IEICE Technical Report; IEICE Tech. Rep. (2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.25835\/0072999"},{"key":"e_1_3_2_1_29_1","volume-title":"Seal-embedded: A homomorphic encryption library for the internet of things. IACR Transactions on Cryptographic Hardware and Embedded Systems","author":"Natarajan Deepika","year":"2021","unstructured":"Deepika Natarajan and Wei Dai. 2021. Seal-embedded: A homomorphic encryption library for the internet of things. IACR Transactions on Cryptographic Hardware and Embedded Systems (2021), 756--779."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527393"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00013"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00074"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 11th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605759.3625257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605759.3625257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:31:25Z","timestamp":1755973885000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605759.3625257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":34,"alternative-id":["10.1145\/3605759.3625257","10.1145\/3605759"],"URL":"https:\/\/doi.org\/10.1145\/3605759.3625257","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}