{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T09:12:57Z","timestamp":1769505177441,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","funder":[{"name":"Gobierno de Arag\uc3b3n","award":["T5820R"],"award-info":[{"award-number":["T5820R"]}]},{"DOI":"10.13039\/501100002809","name":"Generalitat de Catalunya","doi-asserted-by":"publisher","award":["2021-SGR-00763"],"award-info":[{"award-number":["2021-SGR-00763"]}],"id":[{"id":"10.13039\/501100002809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Spanish Ministry of Science, Innovation and Universities","award":["PID2023-146511NB-I00"],"award-info":[{"award-number":["PID2023-146511NB-I00"]}]},{"name":"Spanish National Research Agency","award":["PID2022-136454NB-C22"],"award-info":[{"award-number":["PID2022-136454NB-C22"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,18]]},"DOI":"10.1145\/3725843.3756025","type":"proceedings-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T17:19:56Z","timestamp":1760721596000},"page":"354-368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Ironman: Accelerating Oblivious Transfer Extension for Privacy-Preserving AI with Near-Memory Processing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6575-2194","authenticated-orcid":false,"given":"Chenqi","family":"Lin","sequence":"first","affiliation":[{"name":"School of Software &amp; Microelectronics, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7453-4043","authenticated-orcid":false,"given":"Kang","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7832-828X","authenticated-orcid":false,"given":"Tianshi","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Artificial Intelligence, Peking University, Beijing, Beijing, China and School of Integrated Circuits, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8534-6494","authenticated-orcid":false,"given":"Ling","family":"Liang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4678-7774","authenticated-orcid":false,"given":"Yufei","family":"Wang","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6468-7575","authenticated-orcid":false,"given":"Zhaohui","family":"Chen","sequence":"additional","affiliation":[{"name":"Alibaba Group, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7514-0767","authenticated-orcid":false,"given":"Runsheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Integrated Circuits, Peking University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8433-7281","authenticated-orcid":false,"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7212-2264","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Institute for Artificial Intelligence, Peking University, Beijing, Beijing, China and School of Integrated Circuits, Peking University, Be, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339819"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_3_1_4_2","unstructured":"Jean-Philippe Aumasson. 2019. Too much crypto. Cryptology EPrint Archive (2019)."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484812"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Carsten Baum Samuel Dittmer Peter Scholl and Xiao Wang. 2023. Sok: vector OLE-based zero-knowledge protocols. DCC 91 11 (2023) 3527\u20133561. 10.1007\/s10623-023-01292-8","DOI":"10.1007\/s10623-023-01292-8"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84259-8_4"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Avrim Blum Adam Kalai and Hal Wasserman. 2003. Noise-tolerant learning the parity problem and the statistical query model. Journal of the ACM (JACM) 50 4 (2003) 506\u2013519.","DOI":"10.1145\/792538.792543"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243868"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15979-4_21"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354255"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_16"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS46700.2020.00103"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179345"},{"key":"e_1_3_3_1_15_2","first-page":"1361","volume-title":"USENIX Security 2022","author":"Chandran Nishanth","year":"2022","unstructured":"Nishanth Chandran, Divya Gupta, Sai Lakshmi\u00a0Bhavana Obbattu, and Akash Shah. 2022. SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. In USENIX Security 2022, Kevin R.\u00a0B. Butler and Kurt Thomas (Eds.). USENIX Association, 1361\u20131378."},{"key":"e_1_3_3_1_16_2","unstructured":"Nishanth Chandran Divya Gupta Aseem Rastogi Rahul Sharma and Shardul Tripathi. 2017. EzPC: Programmable efficient and scalable secure two-party computation for machine learning. Cryptology ePrint Archive (2017)."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_2"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589091"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2012.6176428"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0888-1_7"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31371-4_8"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84252-9_17"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30617-4_2"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527388"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_3_1_26_2","unstructured":"Jacob Devlin. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1810.04805 (2018)."},{"key":"e_1_3_3_1_27_2","first-page":"4171","volume-title":"Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, volume 1 (long and short papers)","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. Bert: Pre-training of deep bidirectional transformers for language understanding. In Proceedings of the 2019 conference of the North American chapter of the association for computational linguistics: human language technologies, volume 1 (long and short papers). 4171\u20134186."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559385"},{"key":"e_1_3_3_1_29_2","volume-title":"2nd Conference on Information-Theoretic Cryptography","author":"Dittmer Samuel","year":"2021","unstructured":"Samuel Dittmer, Yuval Ishai, and Rafail Ostrovsky. 2021. Line-Point Zero Knowledge and Its Applications. In 2nd Conference on Information-Theoretic Cryptography."},{"key":"e_1_3_3_1_30_2","unstructured":"Alexey Dosovitskiy Lucas Beyer Alexander Kolesnikov Dirk Weissenborn Xiaohua Zhai Thomas Unterthiner Mostafa Dehghani Matthias Minderer Georg Heigold Sylvain Gelly et\u00a0al. 2020. An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2010.11929 (2020)."},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484800"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_29"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_14"},{"key":"e_1_3_3_1_34_2","volume-title":"A fully homomorphic encryption scheme","author":"Gentry Craig","year":"2009","unstructured":"Craig Gentry. 2009. A fully homomorphic encryption scheme. Stanford university."},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Shafi Goldwasser and Silvio Micali. 1986. How to construct random functions. J. ACM 33 4 (1986) 792\u2013807.","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30545-0_12"},{"key":"e_1_3_3_1_38_2","unstructured":"Meng Hao Hongwei Li Hanxiao Chen Pengzhi Xing Guowen Xu and Tianwei Zhang. 2022. Iron: Private inference on transformers. Advances in neural information processing systems 35 (2022) 15718\u201315731."},{"key":"e_1_3_3_1_39_2","volume-title":"Advances in Neural Information Processing Systems","author":"Hao Meng","year":"2022","unstructured":"Meng Hao, Hongwei Li, Hanxiao Chen, Pengzhi Xing, Guowen Xu, and Tianwei Zhang. 2022. Iron: Private Inference on Transformers. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_3_1_40_2","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2024","author":"Hazay Carmit","year":"2024","unstructured":"Carmit Hazay, David Heath, Vladimir Kolesnikov, Muthuramakrishnan Venkitasubramaniam, and Yibin Yang. 2024. LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK. In Advances in Cryptology \u2013 ASIACRYPT 2024."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_21"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_1"},{"key":"e_1_3_3_1_44_2","unstructured":"Xiaoyang Hou Jian Liu Jingyu Li Yuhan Li Wen jie Lu Cheng Hong and Kui Ren. 2023. CipherGPT: Secure Two-Party GPT Inference. Cryptology ePrint Archive Report 2023\/1147. https:\/\/eprint.iacr.org\/2023\/1147"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"e_1_3_3_1_46_2","first-page":"809","volume-title":"USENIX Security 2022","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference. In USENIX Security 2022, Kevin R.\u00a0B. Butler and Kurt Thomas (Eds.). USENIX Association, 809\u2013826."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690223"},{"key":"e_1_3_3_1_48_2","first-page":"809","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Huang Zhicong","year":"2022","unstructured":"Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding. 2022. Cheetah: Lean and Fast Secure { Two-Party} Deep Neural Network Inference. In 31st USENIX Security Symposium (USENIX Security 22). 809\u2013826."},{"key":"e_1_3_3_1_49_2","unstructured":"Forrest\u00a0N Iandola Song Han Matthew\u00a0W Moskewicz Khalid Ashraf William\u00a0J Dally and Kurt Keutzer. 2016. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and< 0.5 MB model size. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1602.07360 (2016)."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230057"},{"key":"e_1_3_3_1_52_2","first-page":"6435","volume-title":"USENIX Security 2023","author":"Lu Wen jie","year":"2023","unstructured":"Wen jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, and Cheng Hong. 2023. Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. In USENIX Security 2023, Joseph\u00a0A. Calandrino and Carmela Troncoso (Eds.). USENIX Association, 6435\u20136451."},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2429384.2429446"},{"key":"e_1_3_3_1_54_2","first-page":"1651","volume-title":"USENIX Security 2018","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security 2018, William Enck and Adrienne\u00a0Porter Felt (Eds.). USENIX Association, 1651\u20131669."},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_13"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00070"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_35"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Yoongu Kim Weikun Yang and Onur Mutlu. 2015. Ramulator: A fast and extensible DRAM simulator. IEEE Computer architecture letters 15 1 (2015) 45\u201349.","DOI":"10.1109\/LCA.2015.2414456"},{"key":"e_1_3_3_1_59_2","unstructured":"Maximilian Lam Jeff Johnson Wenjie Xiong Kiwan Maeng Udit Gupta Yang Li Liangzhen Lai Ilias Leontiadis Minsoo Rhu Hsien-Hsin\u00a0S Lee et\u00a0al. 2023. Gpu-based private information retrieval for on-device machine learning inference. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2301.10904 (2023)."},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58751-1_6"},{"key":"e_1_3_3_1_61_2","unstructured":"Wen-jie Lu Zhicong Huang Zhen Gu Jingyu Li Jian Liu Cheng Hong Kui Ren Tao Wei and WenGuang Chen. 2024. Bumblebee: Secure two-party inference framework for large transformers. Network and Distributed System Security (NDSS) Symposium 2025 (2024)."},{"key":"e_1_3_3_1_62_2","first-page":"2505","volume-title":"USENIX Security 2020","author":"Mishra Pratyush","year":"2020","unstructured":"Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca\u00a0Ada Popa. 2020. Delphi: A Cryptographic Inference Service for Neural Networks. In USENIX Security 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 2505\u20132522."},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"crossref","unstructured":"Naveen Muralimanohar Rajeev Balasubramonian and Norman\u00a0P Jouppi. 2009. CACTI 6.0: A tool to model large caches. HP laboratories 27 (2009) 28.","DOI":"10.1109\/MM.2008.2"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00130"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00130"},{"key":"e_1_3_3_1_69_2","first-page":"2165","volume-title":"USENIX Security 2021","author":"Patra Arpita","year":"2021","unstructured":"Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX Security 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 2165\u20132182."},{"key":"e_1_3_3_1_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26954-8_13"},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_5"},{"key":"e_1_3_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"e_1_3_3_1_74_2","first-page":"797","volume-title":"USENIX Security 2014","author":"Pinkas Benny","year":"2014","unstructured":"Benny Pinkas, Thomas Schneider, and Michael Zohner. 2014. Faster Private Set Intersection Based on OT Extension. In USENIX Security 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 797\u2013812."},{"key":"e_1_3_3_1_75_2","unstructured":"Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei Ilya Sutskever et\u00a0al. 2019. Language models are unsupervised multitask learners. OpenAI blog 1 8 (2019) 9."},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560658"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38551-3_19"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00086"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417274"},{"key":"e_1_3_3_1_82_2","first-page":"1501","volume-title":"USENIX Security 2019","author":"Riazi M.\u00a0Sadegh","year":"2019","unstructured":"M.\u00a0Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin\u00a0E. Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 1501\u20131518."},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56620-7_9"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_23"},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"crossref","unstructured":"Daniel Sanchez and Christos Kozyrakis. 2013. ZSim: Fast and accurate microarchitectural simulation of thousand-core systems. ACM SIGARCH Computer architecture news 41 3 (2013) 475\u2013486.","DOI":"10.1145\/2508148.2485963"},{"key":"e_1_3_3_1_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"e_1_3_3_1_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339816"},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363228"},{"key":"e_1_3_3_1_90_2","volume-title":"Proc. 29th USENIX secur. symp","author":"Srinivasan Wenting\u00a0Zheng","year":"2019","unstructured":"Wenting\u00a0Zheng Srinivasan, PMRL Akshayaram, and Popa\u00a0Raluca Ada. 2019. Delphi: A cryptographic inference service for neural networks. In Proc. 29th USENIX secur. symp , Vol.\u00a03."},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. International journal of uncertainty fuzziness and knowledge-based systems 10 05 (2002) 557\u2013570.","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_3_1_92_2","unstructured":"Hugo Touvron Thibaut Lavril Gautier Izacard Xavier Martinet Marie-Anne Lachaux Timoth\u00e9e Lacroix Baptiste Rozi\u00e8re Naman Goyal Eric Hambro Faisal Azhar et\u00a0al. 2023. Llama: Open and efficient foundation language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2302.13971 (2023)."},{"key":"e_1_3_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00056"},{"key":"e_1_3_3_1_94_2","first-page":"501","volume-title":"USENIX Security 2021","author":"Weng Chenkai","year":"2021","unstructured":"Chenkai Weng, Kang Yang, Xiang Xie, Jonathan Katz, and Xiao Wang. 2021. Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. In USENIX Security 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 501\u2013518."},{"key":"e_1_3_3_1_95_2","doi-asserted-by":"crossref","unstructured":"Li Xiaolin Yan Wei Liu Hongwei Zhang Yong Hao Qinfen Liu Yong and Sun Ninghui. 2025. POTA: A Pipelined Oblivious Transfer Acceleration Architecture for Secure Multi-Party Computation. IACR Transactions on Cryptographic Hardware and Embedded Systems 2025 3 (2025) 262\u2013292.","DOI":"10.46586\/tches.v2025.i3.262-292"},{"key":"e_1_3_3_1_96_2","unstructured":"Tianshi Xu Shuzhang Zhong Wenxuan Zeng Runsheng Wang and Meng Li. 2024. PrivQuant: Communication-Efficient Private Inference with Quantized Network\/Protocol Co-Optimization. 2024 ACM\/IEEE International Conference on Computer-Aided Design (2024)."},{"key":"e_1_3_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484556"},{"key":"e_1_3_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417276"},{"key":"e_1_3_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623169"},{"key":"e_1_3_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"MICRO 2025: 58th IEEE\/ACM International Symposium on Microarchitecture","location":"Seoul Korea","acronym":"MICRO 2025","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"]},"container-title":["Proceedings of the 58th IEEE\/ACM International Symposium on Microarchitecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3725843.3756025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T21:47:47Z","timestamp":1769464067000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3725843.3756025"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":99,"alternative-id":["10.1145\/3725843.3756025","10.1145\/3725843"],"URL":"https:\/\/doi.org\/10.1145\/3725843.3756025","relation":{},"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"2025-10-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}