{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:10Z","timestamp":1773246910549,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3617232.3624870","type":"proceedings-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T20:10:56Z","timestamp":1713384656000},"page":"302-317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Performance-aware Scale Analysis with Reserve for Homomorphic Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7458-8885","authenticated-orcid":false,"given":"Yongwoo","family":"Lee","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3463-716X","authenticated-orcid":false,"given":"Seonyoung","family":"Cheon","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9611-0233","authenticated-orcid":false,"given":"Dongkwan","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea, South ? Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2240-3316","authenticated-orcid":false,"given":"Dongyoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0762-7901","authenticated-orcid":false,"given":"Hanjun","family":"Kim","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea, South ? Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"265","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. Tensorflow: A system for large-scale machine learning. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pages 265--283, Savannah, GA, November 2016. USENIX Association."},{"key":"e_1_3_2_1_2_1","volume-title":"July","author":"Acar Abbas","year":"2018","unstructured":"Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, and Mauro Conti. A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv., 51(4), July 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Tech. Rep.","author":"Archer David","year":"2017","unstructured":"David Archer, Lily Chen, Jung Hee Cheon, Ran Gilad-Bachrach, Roger A Hallman, Zhicong Huang, Xiaoqian Jiang, Ranjit Kumaresan, Bradley A Malin, Heidi Sofia, et al. Applications of homomorphic encryption. HomomorphicEncryption. org, Redmond WA, Tech. Rep., 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"David W. Archer Jos\u00e9 Manuel Calder\u00f3n Trilla Jason Dagit Alex Malozemoff Yuriy Polyakov Kurt Rohloff and Gerard Ryan. RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications. In Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography WAHC'19 pages 57--68. ACM 2019.","DOI":"10.1145\/3338469.3358945"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358944"},{"key":"e_1_3_2_1_6_1","first-page":"3","volume-title":"Proceedings of the 16th ACM International Conference on Computing Frontiers, CF '19","author":"Boemer Fabian","year":"2019","unstructured":"Fabian Boemer, Yixing Lao, Rosario Cammarota, and Casimir Wierzynski. nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data. In Proceedings of the 16th ACM International Conference on Computing Frontiers, CF '19, pages 3--13. ACM, 2019."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218508"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"e_1_3_2_1_13_1","first-page":"347","volume-title":"Selected Areas in Cryptography - SAC 2018","author":"Cheon Jung Hee","year":"2018","unstructured":"Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, and Yongsoo Song. A full rns variant of approximate homomorphic encryption. In Carlos Cid and Michael J. Jacobson Jr., editors, Selected Areas in Cryptography - SAC 2018, pages 347--368, Cham, 2018. Springer International Publishing."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/github.com\/CEA-LIST\/Cingulata","year":"2020","unstructured":"Cingulata. https:\/\/github.com\/CEA-LIST\/Cingulata, 2020."},{"key":"e_1_3_2_1_18_1","first-page":"311","volume-title":"International Workshop on Public Key Cryptography","author":"Coron Jean-S\u00e9bastien","year":"2014","unstructured":"Jean-S\u00e9bastien Coron, Tancr\u00e8de Lepoint, and Mehdi Tibouchi. Scaleinvariant fully homomorphic encryption over the integers. In International Workshop on Public Key Cryptography, pages 311--328. Springer, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"e_1_3_2_1_21_1","first-page":"401","volume-title":"Revised Selected Papers 23","author":"Costache Anamaria","year":"2017","unstructured":"Anamaria Costache, Nigel P Smart, Srinivas Vivek, and Adrian Waller. Fixed-point arithmetic in she schemes. In Selected Areas in Cryptography-SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10--12, 2016, Revised Selected Papers 23, pages 401--422. Springer, 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454050"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18. Association for Computing Machinery","author":"Crockett Eric","year":"2018","unstructured":"Eric Crockett, Chris Peikert, and Chad Sharp. Alchemy: A language and compiler for homomorphic encryption made easy. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18. Association for Computing Machinery, 2018."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/github.com\/KyoohyungHan\/FullRNS-HEAAN","author":"HEAAN.","year":"2018","unstructured":"FullRNS-HEAAN. https:\/\/github.com\/KyoohyungHan\/FullRNS-HEAAN, 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_31_1","first-page":"129","volume-title":"Implementing gentry's fully-homomorphic encryption scheme","author":"Gentry Craig","year":"2011","unstructured":"Craig Gentry and Shai Halevi. Implementing gentry's fully-homomorphic encryption scheme. volume 6632, pages 129--148, 05 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"e_1_3_2_1_35_1","volume-title":"A general purpose transpiler for fully homomorphic encryption. arXiv preprint arXiv:2106.07893","author":"Gorantala Shruthi","year":"2021","unstructured":"Shruthi Gorantala, Rob Springer, Sean Purser-Haskell, William Lam, Royce Wilson, Asra Ali, Eric P Astor, Itai Zukerman, Sam Ruth, Christoph Dibak, et al. A general purpose transpiler for fully homomorphic encryption. arXiv preprint arXiv:2106.07893, 2021."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/github.com\/snucrypto\/HEAAN","author":"Library HEAAN","year":"2020","unstructured":"HEAAN Open-Source HE Library. https:\/\/github.com\/snucrypto\/HEAAN, 2020."},{"key":"e_1_3_2_1_37_1","volume-title":"https:\/\/github.com\/corelab-src\/elasm","author":"Compiler Hecate HE","year":"2023","unstructured":"Hecate HE Compiler. https:\/\/github.com\/corelab-src\/elasm, 2023."},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/github.com\/homenc\/HElib","author":"Library Elib","year":"2020","unstructured":"HElib Open-Source HE Library. https:\/\/github.com\/homenc\/HElib, 2020."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8756-1.ch038"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2013.6657078"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370308"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385996"},{"key":"e_1_3_2_1_44_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Lee Yongwoo","year":"2023","unstructured":"Yongwoo Lee, Seonyoung Cheon, Dongkwan Kim, Dongyoon Lee, and Hanjun Kim. ELASM: Error-latency-aware scale management for fully homomorphic encryption. In 32nd USENIX Security Symposium (USENIX Security 23), Aneheim, CA, August 2023. USENIX Association."},{"key":"e_1_3_2_1_45_1","volume-title":"Hanjung Kim. HECATE: Performance-Aware Scale Optimization for Homomoprhic Encryption Compiler. In 2022 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","author":"Lee Yongwoo","year":"2022","unstructured":"Yongwoo Lee, Seonyeong Heo, Seonyoung Cheon, Shinnung Jeong, Changsu Kim, Eunkyung Kim, Dongyoon Lee, and Hanjung Kim. HECATE: Performance-Aware Scale Optimization for Homomoprhic Encryption Compiler. In 2022 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), 2022."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582057"},{"key":"e_1_3_2_1_48_1","unstructured":"Oliver Masters Hamish Hunt Enrico Steffinlongo Jack Crawford Flavio Bergamaschi Maria Eugenia Dela Rosa Caio Cesar Quini Camila T Alves Fernanda de Souza and Deise Goncalves Ferreira. Towards a homomorphic machine learning big data pipeline for the financial services sector. IACR Cryptol. ePrint Arch. 2019:1113 2019."},{"key":"e_1_3_2_1_49_1","volume-title":"https:\/\/www.ngraph.ai","author":"Learning Compiler Graph Deep","year":"2020","unstructured":"nGraph Deep Learning Compiler. https:\/\/www.ngraph.ai, 2020."},{"key":"e_1_3_2_1_50_1","volume-title":"October","author":"Lattice Cryptography Library PALISADE","year":"2020","unstructured":"PALISADE Lattice Cryptography Library. https:\/\/palisade-crypto.org\/, October 2020."},{"key":"e_1_3_2_1_51_1","volume-title":"July","author":"Salter Jim","year":"2020","unstructured":"Jim Salter. Ibm completes successful field trials on fully homomorphic encryption. https:\/\/arstechnica.com\/gadgets\/2020\/07\/ibm-completes-successful-field-trials-on-fully-homomorphic-encryption\/, July 2020."},{"key":"e_1_3_2_1_52_1","volume-title":"https:\/\/github.com\/microsoft\/SEAL","author":"Microsoft SEAL","year":"2020","unstructured":"Microsoft SEAL (Release 3.6.1). https:\/\/github.com\/microsoft\/SEAL, 2020."},{"key":"e_1_3_2_1_53_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Viand Alexander","year":"2023","unstructured":"Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi. Heco: Automatic code optimizations for efficient fully homomorphic encryption. In 32nd USENIX Security Symposium (USENIX Security 23), Aneheim, CA, August 2023. USENIX Association."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00068"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267978"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617232.3624870","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617232.3624870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:14Z","timestamp":1750178774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617232.3624870"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":51,"alternative-id":["10.1145\/3617232.3624870","10.1145\/3617232"],"URL":"https:\/\/doi.org\/10.1145\/3617232.3624870","relation":{},"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}