{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:33:49Z","timestamp":1772724829628,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","funder":[{"name":"Institute of Information &amp; communications Technology Planning &amp; Evaluation","award":["RS-2021-II211343, RS-2023-00256081, RS-2025-02217656"],"award-info":[{"award-number":["RS-2021-II211343, RS-2023-00256081, RS-2025-02217656"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,3,22]]},"DOI":"10.1145\/3760250.3762223","type":"proceedings-article","created":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T15:06:36Z","timestamp":1765465596000},"page":"35-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Cheddar: A Swift Fully Homomorphic Encryption Library Designed for GPU Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0941-4805","authenticated-orcid":false,"given":"Wonseok","family":"Choi","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2937-3073","authenticated-orcid":false,"given":"Jongmin","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1733-1394","authenticated-orcid":false,"given":"Jung Ho","family":"Ahn","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605759.3625257"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614302"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070953"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563379"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_2"},{"key":"e_1_3_2_1_6_1","volume-title":"Demystifying Bootstrapping in Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, 149","author":"Badawi Ahmad Al","year":"2023","unstructured":"Ahmad Al Badawi and Yuriy Polyakov. 2023. Demystifying Bootstrapping in Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, 149 (2023). https:\/\/eprint.iacr.org\/2023\/149."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/36664.36688"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474366.3486926"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_21"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Jean-Philippe Bossuat Juan Troncoso-Pastoriza and Jean-Pierre Hubaux. 2022. Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. In Applied Cryptography and Network Security. doi:10.1007\/978-3-031-09234-3_26","DOI":"10.1007\/978-3-031-09234-3_26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Hao Chen Kim Laine and Rachel Player. 2017. Simple Encrypted Arithmetic Library - SEAL v2.1. In Financial Cryptography and Data Security. doi:10.1007\/978-3-319-70278-0_1","DOI":"10.1007\/978-3-319-70278-0_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. In ACM Conference on Computer and Communications Security.","author":"Cheon Jung Hee","year":"2025","unstructured":"Jung Hee Cheon, Hyeongmin Choe, Minsik Kang, Jaehyung Kim, Seonghak Kim, Johannes Mono, and Taeyeong Noh. 2025. Grafting: Decoupled Scale Factors and Modulus in RNS-CKKS. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Jung Hee Cheon Kyoohyung Han Andrey Kim Miran Kim and Yongsoo Song. 2018a. A Full RNS Variant of Approximate Homomorphic Encryption. In Selected Areas in Cryptography. doi:10.1007\/978-3-030-10970-7_16","DOI":"10.1007\/978-3-030-10970-7_16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78381-9_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.4134\/JKMS.j200650"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1090\/s0025-5718-1965-0178586-1"},{"key":"e_1_3_2_1_18_1","unstructured":"CryptoLab. 2023. HEaaN Private AI Homomorphic Encryption Library. https:\/\/heaan.it."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_20_1","unstructured":"DESILO. 2023. Liberate.FHE: A New FHE Library for Bridging the Gap between Theory and Practice with a Focus on Performance and Accuracy. https:\/\/github.com\/Desilo\/liberate-fhe."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT52795.2021.00032"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2022.3163817"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"Guang Fan Mingzhe Zhang Fangyu Zheng Shengyu Fan Tian Zhou Xianglong Deng Wenxu Tang Liang Kong Yixuan Song and Shoumeng Yan. 2025. WarpDrive: GPU-Based Fully Homomorphic Encryption Acceleration Leveraging Tensor and CUDA Cores. In HPCA. doi:10.1109\/HPCA61900.2025.00091","DOI":"10.1109\/HPCA61900.2025.00091"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS54959.2023.00085"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Shengyu Fan Zhiwei Wang Weizhi Xu Rui Hou Dan Meng and Mingzhe Zhang. 2023a. TensorFHE: Achieving Practical Computation on Encrypted Data Using GPGPU. In HPCA. doi:10.1109\/HPCA56546.2023.10071017","DOI":"10.1109\/HPCA56546.2023.10071017"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03156-7"},{"key":"e_1_3_2_1_28_1","volume-title":"Design and implementation of HElib: a homomorphic encryption library. IACR Cryptology ePrint Archive, 1481","author":"Halevi Shai","year":"2020","unstructured":"Shai Halevi and Victor Shoup. 2020. Design and implementation of HElib: a homomorphic encryption library. IACR Cryptology ePrint Archive, 1481 (2020). https:\/\/eprint.iacr.org\/2020\/1481."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019466"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"Kyoohyung Han and Dohyeong Ki. 2020. Better Bootstrapping for Approximate Homomorphic Encryption. In Cryptographers' Track at the RSA Conference. doi:10.1007\/978-3-030-40186-3_16","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsc.2013.09.002"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3106167"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA61900.2025.00088"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690375"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of Machine Learning and Systems. https:\/\/proceedings.mlsys.org\/paper_files\/paper\/2019\/file\/9db64c20dee0011899dfdf200e61ef35-Paper.pdf","author":"Jung Wonkyung","year":"2019","unstructured":"Wonkyung Jung, Daejin Jung, Byeongho Kim, Sunjung Lee, Wonjong Rhee, and Jung Ho Ahn. 2019. Restructuring Batch Normalization to Accelerate CNN Training. In Proceedings of Machine Learning and Systems. https:\/\/proceedings.mlsys.org\/paper_files\/paper\/2019\/file\/9db64c20dee0011899dfdf200e61ef35-Paper.pdf"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3096189"},{"key":"e_1_3_2_1_38_1","volume-title":"GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security Symposium. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar"},{"key":"e_1_3_2_1_39_1","volume-title":"CUTLASS: Fast Linear Algebra in CUDA C. https:\/\/developer.nvidia.com\/blog\/cutlass-linear-algebra-cuda.","author":"Kerr Andrew","year":"2017","unstructured":"Andrew Kerr, Duane Merrill, Julien Demouth, and John Tran. 2017. CUTLASS: Fast Linear Algebra in CUDA C. https:\/\/developer.nvidia.com\/blog\/cutlass-linear-algebra-cuda."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","unstructured":"Andrey Kim Antonis Papadimitriou and Yuriy Polyakov. 2022c. Approximate Homomorphic Encryption with Reduced Approximation Error. In Cryptographers' Track at the RSA Conference. doi:10.1007\/978-3-030-95312-6_6","DOI":"10.1007\/978-3-030-95312-6_6"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3348170"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579371.3589053"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00086"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA61900.2025.00089"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC50251.2020.00033"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527415"},{"key":"e_1_3_2_1_47_1","unstructured":"Eunsang Lee Joon-Woo Lee Junghyun Lee Young-Sik Kim Yongjune Kim Jong-Seon No and Woosuk Choi. 2022b. Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Parallel Convolutions. In International Conference on Machine Learning. https:\/\/proceedings.mlr.press\/v162\/lee22e.html"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"e_1_3_2_1_49_1","volume-title":"HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption. In International Conference on Machine Learning. https:\/\/proceedings.mlr.press\/v202\/lee23m.html","author":"Lee Seewoo","year":"2023","unstructured":"Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, and Mun-Kyu Lee. 2023. HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption. In International Conference on Machine Learning. https:\/\/proceedings.mlr.press\/v202\/lee23m.html"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03392-x"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1985-0777282-X"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.25835\/0072999"},{"key":"e_1_3_2_1_53_1","volume-title":"HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0. IACR Cryptology ePrint Archive, 1543","author":"\u00d6zcan Ali \u015eah","year":"2024","unstructured":"Ali \u015eah \u00d6zcan and Erkay Savacs. 2024. HEonGPU: a GPU-based Fully Homomorphic Encryption Library 1.0. IACR Cryptology ePrint Archive, 1543 (2024). https:\/\/eprint.iacr.org\/2024\/1543."},{"key":"e_1_3_2_1_54_1","volume-title":"Jung Hee Cheon, and Jung Ho Ahn","author":"Park Jaiyoung","year":"2023","unstructured":"Jaiyoung Park, Donghwan Kim, Jongmin Kim, Sangpyo Kim, Wonkyung Jung, Jung Hee Cheon, and Jung Ho Ahn. 2023. Toward Practical Privacy-Preserving Convolutional Neural Networks Exploiting Fully Homomorphic Encryption. In Workshop on Data Integrity and Secure Cloud Computing. https:\/\/dtrilla.github.io\/discc-workshop-2023\/assets\/pdfs\/DISCC_2023_paper_4.pdf"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2201.06699"},{"key":"e_1_3_2_1_56_1","volume-title":"Workshop on Privacy in Natural Language Processing. https:\/\/ceur-ws.org\/Vol-2573\/PrivateNLP_Paper3.pdf","author":"Podschwadt Robert","year":"2020","unstructured":"Robert Podschwadt and Daniel Takabi. 2020. Classification of Encrypted Word Embeddings using Recurrent Neural Networks. In Workshop on Privacy in Natural Language Processing. https:\/\/ceur-ws.org\/Vol-2573\/PrivateNLP_Paper3.pdf"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378523"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Sujoy Sinha Roy Furkan Turan Kimmo J\u00e4rvinen Frederik Vercauteren and Ingrid Verbauwhede. 2019. FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data. In HPCA. doi:10.1109\/HPCA.2019.00052","DOI":"10.1109\/HPCA.2019.00052"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","unstructured":"Nikola Samardzic Axel Feldmann Aleksandar Krastev Srinivas Devadas Ronald Dreslinski Christopher Peikert and Daniel Sanchez. 2021. F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption. In MICRO. doi:10.1145\/3466752.3480070","DOI":"10.1145\/3466752.3480070"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Nikola Samardzic Axel Feldmann Aleksandar Krastev Nathan Manohar Nicholas Genise Srinivas Devadas Karim Eldefrawy Chris Peikert and Daniel Sanchez. 2022. CraterLake: A Hardware Accelerator for Efficient Unbounded Computation on Encrypted Data. In ISCA. doi:10.1145\/3470496.3527393","DOI":"10.1145\/3470496.3527393"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Nikola Samardzic and Daniel Sanchez. 2024. BitPacker: Enabling High Arithmetic Efficiency in Fully Homomorphic Encryption Accelerators. In ASPLOS. doi:10.1145\/3620665.3640397","DOI":"10.1145\/3620665.3640397"},{"key":"e_1_3_2_1_62_1","volume-title":"Faster AVX2 Optimized NTT Multiplication for Ring-LWE Lattice Cryptography. IACR Cryptology ePrint Archive, 39","author":"Seiler Gregor","year":"2018","unstructured":"Gregor Seiler. 2018. Faster AVX2 Optimized NTT Multiplication for Ring-LWE Lattice Cryptography. IACR Cryptology ePrint Archive, 39 (2018). https:\/\/eprint.iacr.org\/2018\/39."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3227874"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613424.3614279"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED55351.2022.00013"},{"key":"e_1_3_2_1_66_1","volume-title":"NTL: A Library for Doing Number Theory (Version 11.5.1). https:\/\/libntl.org.","author":"Shoup Victor","year":"2021","unstructured":"Victor Shoup. 2021. NTL: A Library for Doing Number Theory (Version 11.5.1). https:\/\/libntl.org."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3363900"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA56546.2023.10070984"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00074"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","unstructured":"Yilan Zhu Xinyao Wang Lei Ju and Shanqing Guo. 2023. FxHENN: FPGA-based Acceleration Framework for Homomorphic Encrypted CNN Inference. In HPCA. doi:10.1109\/HPCA56546.2023.10071133","DOI":"10.1109\/HPCA56546.2023.10071133"}],"event":{"name":"ASPLOS '26:31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh PA USA","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 31st ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3760250.3762223","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T15:09:21Z","timestamp":1765465761000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3760250.3762223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,11]]},"references-count":70,"alternative-id":["10.1145\/3760250.3762223","10.1145\/3760250"],"URL":"https:\/\/doi.org\/10.1145\/3760250.3762223","relation":{},"subject":[],"published":{"date-parts":[[2025,12,11]]},"assertion":[{"value":"2025-12-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}