{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:40:09Z","timestamp":1755844809783,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"HORIZON EUROPE Digital, Industry and Space","doi-asserted-by":"publisher","award":["101070473"],"award-info":[{"award-number":["101070473"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3690347","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1954-1966","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Floating-Point Arithmetic for Noise Addition"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2222-9394","authenticated-orcid":false,"given":"Naoise","family":"Holohan","sequence":"first","affiliation":[{"name":"IBM Research Europe -- Ireland, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5519-1674","authenticated-orcid":false,"given":"Stefano","family":"Braghin","sequence":"additional","affiliation":[{"name":"IBM Research Europe -- Ireland, Dublin, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8097-6297","authenticated-orcid":false,"given":"Mohamed","family":"Suliman","sequence":"additional","affiliation":[{"name":"IBM Research Europe -- Ireland &amp; Trinity College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/355604.361593"},{"key":"e_1_3_2_1_2_1","first-page":"403","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan","author":"Balle B.","year":"2018","unstructured":"Balle, B., and Wang, Y. Improving the Gaussian mechanism for differential privacy: Analytical calibration and optimal denoising. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, July 10--15, 2018 (2018), pp. 403--412."},{"key":"e_1_3_2_1_3_1","volume-title":"Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy. CoRR abs\/2212.04133","author":"Berghel S.","year":"2022","unstructured":"Berghel, S., Bohannon, P., Desfontaines, D., Estes, C., Haney, S., Hartman, L., Hay, M., Machanavajjhala, A., Magerlein, T., Miklau, G., Pai, A., Sexton, W., and Shrestha, R. Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy. CoRR abs\/2212.04133 (2022)."},{"key":"e_1_3_2_1_4_1","first-page":"15676","volume-title":"Advances in Neural Information Processing Systems","author":"Canonne C. L.","year":"2020","unstructured":"Canonne, C. L., Kamath, G., and Steinke, T. The discrete Gaussian for differential privacy. In Advances in Neural Information Processing Systems (2020), H. Larochelle, M. Ranzato, R. Hadsell, M. F. Balcan, and H. Lin, Eds., vol. 33, Curran Associates, Inc., pp. 15676--15688."},{"key":"e_1_3_2_1_5_1","first-page":"471","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2022), CCS '22, Association for Computing Machinery","author":"Casacuberta S.","unstructured":"Casacuberta, S., Shoemate, M., Vadhan, S., and Wagaman, C. Widespread underestimation of sensitivity in differentially private libraries and how to fix it. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2022), CCS '22, Association for Computing Machinery, p. 471--484."},{"key":"e_1_3_2_1_6_1","volume-title":"Snapping mechanism notes. https:\/\/github.com\/ ctcovington\/floating_point\/blob\/master\/snapping_mechanism\/notes\/ snapping_implementation_notes.pdf, 8","author":"Covington C.","year":"2020","unstructured":"Covington, C. Snapping mechanism notes. https:\/\/github.com\/ ctcovington\/floating_point\/blob\/master\/snapping_mechanism\/notes\/ snapping_implementation_notes.pdf, 8 2020."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-8643-8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork C.","year":"2014","unstructured":"Dwork, C., Roth, A., et al. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_10_1","volume-title":"Manuscript","author":"Gaboardi M.","year":"2020","unstructured":"Gaboardi, M., Hay, M., and Vadhan, S. A programming framework for OpenDP. Manuscript, May (2020)."},{"key":"e_1_3_2_1_11_1","series-title":"Proceedings of Machine Learning Research","first-page":"3713","volume-title":"Proceedings of the 38th International Conference on Machine Learning, ICML","author":"Gillenwater J.","year":"2021","unstructured":"Gillenwater, J., Joseph, M., and Kulesza, A. Differentially private quantiles. In Proceedings of the 38th International Conference on Machine Learning, ICML 2021, 18--24 July 2021, Virtual Event (2021), M. Meila and T. Zhang, Eds., vol. 139 of Proceedings of Machine Learning Research, PMLR, pp. 3713--3722."},{"key":"e_1_3_2_1_12_1","volume-title":"Computer arithmetic. Computer Architecture: A Quantitative Approach, David Patterson and John L","author":"Goldberg D.","year":"1990","unstructured":"Goldberg, D. Computer arithmetic. Computer Architecture: A Quantitative Approach, David Patterson and John L. Hennessy, Eds. Morgan Kaufmann, Los Altos, Calif., Appendix A (1990)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/103162.103163"},{"key":"e_1_3_2_1_14_1","volume-title":"Secure noise generation. github.com\/google 1, 1 (Jun","author":"Google Differential Privacy Team","year":"2020","unstructured":"Google Differential Privacy Team. Secure noise generation. github.com\/google 1, 1 (Jun 2020), 1--14."},{"key":"e_1_3_2_1_15_1","volume-title":"Precisionbased attacks and interval refining: how to break, then fix, differential privacy on finite computers. ArXiv e-prints 2207.13793 [cs.CR]","author":"Haney S.","year":"2022","unstructured":"Haney, S., Desfontaines, D., Hartman, L., Shrestha, R., and Hay, M. Precisionbased attacks and interval refining: how to break, then fix, differential privacy on finite computers. ArXiv e-prints 2207.13793 [cs.CR] (2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Neural Information Processing Systems","author":"Hardt M.","year":"2012","unstructured":"Hardt, M., Ligett, K., and McSherry, F. A simple and practical algorithm for differentially private data release. In Advances in Neural Information Processing Systems (2012), F. Pereira, C. Burges, L. Bottou, and K. Weinberger, Eds., vol. 25, Curran Associates, Inc."},{"key":"e_1_3_2_1_17_1","volume-title":"Random number generators and seeding for differential privacy. ArXiv e-prints 2307.03543 [cs.CR]","author":"Holohan N.","year":"2023","unstructured":"Holohan, N. Random number generators and seeding for differential privacy. ArXiv e-prints 2307.03543 [cs.CR] (2023)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_26"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"IEEE standard for floating-point arithmetic","author":"IEEE Computer Society","year":"2019","unstructured":"IEEE Computer Society. IEEE standard for floating-point arithmetic. IEEE STD 754--2019 (2019), 1--84.","journal-title":"IEEE STD 754--"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417269"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833672"},{"key":"e_1_3_2_1_22_1","volume-title":"Secure noise sampling for DP in MPC with finite precision. IACR Cryptol. ePrint Arch. 2023","author":"Keller H.","year":"2023","unstructured":"Keller, H., M\u00f6llering, H., Schneider, T., Tkachenko, O., and Zhao, L. Secure noise sampling for DP in MPC with finite precision. IACR Cryptol. ePrint Arch. 2023 (2023), 1594."},{"key":"e_1_3_2_1_23_1","volume-title":"Guidelines for implementing and auditing differentially private systems. ArXiv e-prints","author":"Kifer D.","year":"2002","unstructured":"Kifer, D., Messing, S., Roth, A., Thakurta, A., and Zhang, D. Guidelines for implementing and auditing differentially private systems. ArXiv e-prints 2002.04049 [cs.CR] (Feb. 2020)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21551-3_3"},{"key":"e_1_3_2_1_25_1","first-page":"1905","volume-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2023), CCS '23, Association for Computing Machinery","author":"Lokna J.","unstructured":"Lokna, J., Paradis, A., Dimitrov, D. I., and Vechev, M. Group and attack: Auditing differential privacy. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2023), CCS '23, Association for Computing Machinery, p. 1905--1918."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1211202"},{"key":"e_1_3_2_1_27_1","first-page":"650","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS '12, Association for Computing Machinery","author":"Mironov I.","unstructured":"Mironov, I. On significance of the least significant bits for differential privacy. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS '12, Association for Computing Machinery, p. 650--661."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(75)90022-8"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118799635"},{"key":"e_1_3_2_1_30_1","volume-title":"Opacus: User-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298","author":"Yousefpour A.","year":"2021","unstructured":"Yousefpour, A., Shilov, I., Sablayrolles, A., Testuggine, D., Prasad, K., Malek, M., Nguyen, J., Ghosh, S., Bharadwaj, A., Zhao, J., Cormode, G., and Mironov, I. Opacus: User-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690347","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3690347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:09:03Z","timestamp":1755842943000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3690347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":30,"alternative-id":["10.1145\/3658644.3690347","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3690347","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}