{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T23:50:57Z","timestamp":1768780257402,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["HR0011-23-1-0006"],"award-info":[{"award-number":["HR0011-23-1-0006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3676536.3676809","type":"proceedings-article","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:21:20Z","timestamp":1744204880000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["AMAZE: Accelerated MiMC Hardware Architecture for Zero-Knowledge Applications on the Edge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4596-5389","authenticated-orcid":false,"given":"Anees","family":"Ahmed","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4329-0197","authenticated-orcid":false,"given":"Nojan","family":"Sheybani","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6878-0600","authenticated-orcid":false,"given":"Davi","family":"Moreno","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3393-6851","authenticated-orcid":false,"given":"Nges Brian","family":"Njungle","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4041-1290","authenticated-orcid":false,"given":"Tengkai","family":"Gong","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1432-6939","authenticated-orcid":false,"given":"Michel","family":"Kinsy","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0798-3794","authenticated-orcid":false,"given":"Farinaz","family":"Koushanfar","sequence":"additional","affiliation":[{"name":"University of California San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Amazon EC2 F1 Instances --- aws.amazon.com. https:\/\/aws.amazon.com\/ec2\/instance-types\/f1\/. [Accessed 02-05-2024]."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. arkworks --- github.com. https:\/\/github.com\/arkworks-rs. [Accessed 06-05-2024]."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. GitHub - bsdevlin\/fpga_snark_prover: An acceleration engine for proving SNARKS over the bn128 curve targeted for AWS FPGAs --- github.com. https:\/\/github.com\/bsdevlin\/fpga_snark_prover. [Accessed 02-05-2024]."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. GitHub - datenlord\/TRIDENT: A Hardware Implemented Poseidon Hasher --- github.com. https:\/\/github.com\/datenlord\/TRIDENT.git. [Accessed 03-05-2024]."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. GitHub - HarryR\/ethsnarks: A toolkit for viable zk-SNARKS on Ethereum Web Mobile and Desktop --- github.com. https:\/\/github.com\/HarryR\/ethsnarks. [Accessed 06-05-2024]."},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. GitHub - Tetration-Lab\/arkworks-mimc: Arkworks implementation of cryptographic hash function MiMC --- github.com. https:\/\/github.com\/Tetration-Lab\/arkworks-mimc. [Accessed 06-05-2024]."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. GitHub - ZcashFoundation\/zcash-fpga: Zcash FPGA acceleration engine --- github.com. https:\/\/github.com\/ZcashFoundation\/zcash-fpga\/tree\/master. [Accessed 02-05-2024]."},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. Stratix\u00ae V GX FPGA Development Kit --- intel.com. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/details\/fpga\/development-kits\/stratix\/v-gx.html. [Accessed 02-05-2024]."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_7"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings, Part II 24","author":"Albrecht Martin R","year":"2019","unstructured":"Martin R Albrecht, Lorenzo Grassi, L\u00e9o Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, and Markus Schofnegger. 2019. Feistel structures for MPC, and more. In Computer Security-ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23--27, 2019, Proceedings, Part II 24. Springer, 151--171."},{"key":"e_1_3_2_1_11_1","volume-title":"Design of symmetric-key primitives for advanced cryptographic protocols. IACR Transactions on Symmetric Cryptology","author":"Aly Abdelrahaman","year":"2020","unstructured":"Abdelrahaman Aly, Tomer Ashur, Eli Ben-Sasson, Siemen Dhooghe, and Alan Szepieniec. 2020. Design of symmetric-key primitives for advanced cryptographic protocols. IACR Transactions on Symmetric Cryptology (2020), 1--45."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36413-7_19"},{"key":"e_1_3_2_1_13_1","volume-title":"International workshop on selected areas in cryptography. Springer, 319--331","author":"Barreto Paulo SLM","year":"2005","unstructured":"Paulo SLM Barreto and Michael Naehrig. 2005. Pairing-friendly elliptic curves of prime order. In International workshop on selected areas in cryptography. Springer, 319--331."},{"key":"e_1_3_2_1_14_1","volume-title":"Conference on the Theory and Application of Cryptographic Techniques. Springer, 311--323","author":"Barrett Paul","year":"1986","unstructured":"Paul Barrett. 1986. Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In Conference on the Theory and Application of Cryptographic Techniques. Springer, 311--323."},{"key":"e_1_3_2_1_15_1","volume-title":"transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive","author":"Ben-Sasson Eli","year":"2018","unstructured":"Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-016-0221-0"},{"key":"e_1_3_2_1_17_1","volume-title":"Stark friendly hash-survey and recommendation. Cryptology ePrint Archive","author":"Ben-Sasson Eli","year":"2020","unstructured":"Eli Ben-Sasson, Lior Goldberg, and David Levit. 2020. Stark friendly hash-survey and recommendation. Cryptology ePrint Archive (2020)."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Galois field in cryptography","volume":"1","author":"Benvenuto Christoforus Juan","year":"2012","unstructured":"Christoforus Juan Benvenuto. 2012. Galois field in cryptography. University of Washington 1, 1 (2012), 1--11.","journal-title":"University of Washington"},{"key":"e_1_3_2_1_19_1","volume-title":"ECRYPT hash workshop","author":"Bertoni Guido","unstructured":"Guido Bertoni, Joan Daemen, Micha\u00ebl Peeters, and Gilles Van Assche. 2007. Sponge functions. In ECRYPT hash workshop, Vol. 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3048363"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00050"},{"key":"e_1_3_2_1_22_1","unstructured":"Bsdevlin. [n. d.]. Fpga_snark_prover\/fpga_snark_prover\/kernel\/readme.md at master \u00b7 bsdevlin\/FPGA_SNARK_PROVER. https:\/\/github.com\/bsdevlin\/fpga_snark_prover\/blob\/master\/fpga_snark_prover\/kernel\/README.md"},{"key":"e_1_3_2_1_23_1","volume-title":"A review of zk-snarks. arXiv preprint arXiv:2202.06877","author":"Chen Thomas","year":"2022","unstructured":"Thomas Chen, Hui Lu, Teeramet Kunpittaya, and Alan Luo. 2022. A review of zk-snarks. arXiv preprint arXiv:2202.06877 (2022)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051145"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings 25","author":"Coron Jean-S\u00e9bastien","year":"2005","unstructured":"Jean-S\u00e9bastien Coron, Yevgeniy Dodis, C\u00e9cile Malinaud, and Prashant Puniya. 2005. Merkle-Damg\u00e5rd revisited: How to construct a hash function. In Advances in Cryptology-CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14--18, 2005. Proceedings 25. Springer, 430--448."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2022.103766"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00448"},{"key":"e_1_3_2_1_28_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Grassi Lorenzo","year":"2021","unstructured":"Lorenzo Grassi, Dmitry Khovratovich, Christian Rechberger, Arnab Roy, and Markus Schofnegger. 2021. Poseidon: A new hash function for {Zero-Knowledge} proof systems. In 30th USENIX Security Symposium (USENIX Security 21). 519--535."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37679-5_8"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"e_1_3_2_1_31_1","unstructured":"Ingonyama. 2022. Systemization of knowledge: ZK-friendly hash functions. https:\/\/medium.com\/@ingonyama\/system-of-knowledge-zk-friendly-hash-functions-ab825616c9f1"},{"key":"e_1_3_2_1_32_1","volume-title":"ABDK Consulting","author":"Khovratovich Dmitry","year":"2019","unstructured":"Dmitry Khovratovich and Mikhail Vladimirov. 2019. Tornado Privacy Solution. Cryptographic Review. Version 1.1. ABDK Consulting, November 29 (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.502403"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3431920.3439306"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2011.2160052"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485379"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.15"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575711"},{"key":"e_1_3_2_1_39_1","volume-title":"Paul C Van Oorschot, and Scott A Vanstone","author":"Menezes Alfred J","year":"2018","unstructured":"Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. 2018. Handbook of applied cryptography. CRC press."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.10.009"},{"key":"e_1_3_2_1_41_1","volume-title":"zk-SNARKs: a gentle introduction. Ecole Normale Superieure","author":"Nitulescu Anca","year":"2020","unstructured":"Anca Nitulescu. 2020. zk-SNARKs: a gentle introduction. Ecole Normale Superieure (2020)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2013.2278331"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS48256.2020.9027413"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2003.1206214"},{"key":"e_1_3_2_1_45_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Weng Chenkai","year":"2021","unstructured":"Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. 2021. Mystique: Efficient conversions for Zero-Knowledge proofs with applications to machine learning. In 30th USENIX Security Symposium (USENIX Security 21). 501--518."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149366"},{"key":"e_1_3_2_1_47_1","volume-title":"Pipemsm: Hardware acceleration for multi-scalar multiplication. Cryptology ePrint Archive","author":"Xavier Charles F","year":"2022","unstructured":"Charles F Xavier. 2022. Pipemsm: Hardware acceleration for multi-scalar multiplication. Cryptology ePrint Archive (2022)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00040"}],"event":{"name":"ICCAD '24: 43rd IEEE\/ACM International Conference on Computer-Aided Design","location":"Newark Liberty International Airport Marriott New York NY USA","acronym":"ICCAD '24","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE EDS"]},"container-title":["Proceedings of the 43rd IEEE\/ACM International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3676809","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676536.3676809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:44Z","timestamp":1750295924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676536.3676809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":48,"alternative-id":["10.1145\/3676536.3676809","10.1145\/3676536"],"URL":"https:\/\/doi.org\/10.1145\/3676536.3676809","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2025-04-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}