{"id":"https://openalex.org/W7140695130","doi":"https://doi.org/10.1109/fpl68686.2025.00025","title":"FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption","display_name":"FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W7140695130","doi":"https://doi.org/10.1109/fpl68686.2025.00025"},"language":null,"primary_location":{"id":"doi:10.1109/fpl68686.2025.00025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpl68686.2025.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 35th International Conference on Field-Programmable Logic and Applications (FPL)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101417633","display_name":"Zhihan Xu","orcid":"https://orcid.org/0000-0003-0599-4844"},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhihan Xu","raw_affiliation_strings":["University of Southern California,USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California,USA","institution_ids":["https://openalex.org/I1174212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042560222","display_name":"Rajgopal Kannan","orcid":"https://orcid.org/0000-0001-8736-3012"},"institutions":[{"id":"https://openalex.org/I2802705668","display_name":"United States Army Combat Capabilities Development Command","ror":"https://ror.org/02rdkx920","country_code":"US","type":"other","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajgopal Kannan","raw_affiliation_strings":["DEVCOM Army Research Office"],"affiliations":[{"raw_affiliation_string":"DEVCOM Army Research Office","institution_ids":["https://openalex.org/I2802705668"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130685255","display_name":"Viktor K. Prasanna","orcid":null},"institutions":[{"id":"https://openalex.org/I1174212","display_name":"University of Southern California","ror":"https://ror.org/03taz7m60","country_code":"US","type":"education","lineage":["https://openalex.org/I1174212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Viktor K. Prasanna","raw_affiliation_strings":["University of Southern California,USA"],"affiliations":[{"raw_affiliation_string":"University of Southern California,USA","institution_ids":["https://openalex.org/I1174212"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101417633"],"corresponding_institution_ids":["https://openalex.org/I1174212"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.88199488,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"100","last_page":"109"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.7258999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.7258999943733215,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.19249999523162842,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.042399998754262924,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5685999989509583},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5437999963760376},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4431000053882599},{"id":"https://openalex.org/keywords/multiplication","display_name":"Multiplication (music)","score":0.43790000677108765},{"id":"https://openalex.org/keywords/acceleration","display_name":"Acceleration","score":0.43220001459121704},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.39430001378059387}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6610999703407288},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5685999989509583},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5437999963760376},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4431000053882599},{"id":"https://openalex.org/C2780595030","wikidata":"https://www.wikidata.org/wiki/Q3860309","display_name":"Multiplication (music)","level":2,"score":0.43790000677108765},{"id":"https://openalex.org/C117896860","wikidata":"https://www.wikidata.org/wiki/Q11376","display_name":"Acceleration","level":2,"score":0.43220001459121704},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.39430001378059387},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.3776000142097473},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.32190001010894775},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32170000672340393},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3118000030517578},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.30979999899864197},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3059000074863434},{"id":"https://openalex.org/C9368797","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"Disk encryption","level":4,"score":0.2985000014305115},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28209999203681946},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28130000829696655},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.26820001006126404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fpl68686.2025.00025","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fpl68686.2025.00025","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 35th International Conference on Field-Programmable Logic and Applications (FPL)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1647595406","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2594234880","https://openalex.org/W2737889100","https://openalex.org/W2768174108","https://openalex.org/W2794927157","https://openalex.org/W2889746123","https://openalex.org/W2899140612","https://openalex.org/W2940450480","https://openalex.org/W2942711826","https://openalex.org/W2966536036","https://openalex.org/W2969350772","https://openalex.org/W3005730048","https://openalex.org/W3006531732","https://openalex.org/W3012235108","https://openalex.org/W3094696138","https://openalex.org/W3157477139","https://openalex.org/W3173128495","https://openalex.org/W3193495651","https://openalex.org/W3205982643","https://openalex.org/W3212932635","https://openalex.org/W4200166822","https://openalex.org/W4205474236","https://openalex.org/W4281609193","https://openalex.org/W4281732143","https://openalex.org/W4281792301","https://openalex.org/W4303986861","https://openalex.org/W4307925365","https://openalex.org/W4311839598","https://openalex.org/W4360831809","https://openalex.org/W4360831815","https://openalex.org/W4360831964","https://openalex.org/W4386764044","https://openalex.org/W4386942772","https://openalex.org/W4389491906","https://openalex.org/W4401881819","https://openalex.org/W4402194615","https://openalex.org/W4407953952","https://openalex.org/W7133216292"],"related_works":[],"abstract_inverted_index":{"Homomorphic":[0,36,110],"Encryption":[1],"(HE)":[2],"enables":[3],"secure":[4],"computation":[5],"on":[6,171],"encrypted":[7],"data,":[8],"addressing":[9],"privacy":[10],"concerns":[11],"in":[12,117],"cloud":[13],"computing.":[14],"However,":[15],"the":[16,70,114,137,143],"high":[17],"computational":[18],"cost":[19,66],"of":[20,59,78,164,192],"HE":[21,60,79,99,118,150,165,210],"operations,":[22],"particularly":[23],"matrix":[24,83,155,180],"multiplication":[25],"(MM),":[26],"remains":[27],"a":[28,55,65,75,106,161],"major":[29,115],"barrier":[30],"to":[31,68],"its":[32,176,203],"practical":[33],"deployment.":[34],"Accelerating":[35],"Encrypted":[37],"MM":[38,211],"(HE":[39],"MM)":[40],"is":[41,93,158],"crucial":[42],"for":[43,74,95,109,149,160,207],"applications":[44],"such":[45],"as":[46],"privacy-preserving":[47],"machine":[48],"learning.":[49],"In":[50],"this":[51,102],"paper,":[52],"we":[53,104,140],"present":[54],"bandwidth-efficient":[56],"FPGA":[57],"implementation":[58],"MM.":[61,100,119,151],"We":[62,168],"first":[63,144],"develop":[64],"model":[67],"evaluate":[69,175],"on-chip":[71,90,128],"memory":[72,91,125,129],"requirement":[73],"given":[76],"set":[77],"parameters":[80],"and":[81,97,127,157,174,182,205,212],"input":[82],"sizes.":[84],"Our":[85,120],"analysis":[86],"shows":[87],"that":[88,187],"optimizing":[89],"usage":[92],"critical":[94],"scalable":[96],"efficient":[98],"To":[101],"end,":[103],"design":[105],"novel":[107],"datapath":[108,121],"Linear":[111],"Transformation":[112],"(HLT),":[113],"bottleneck":[116],"significantly":[122],"reduces":[123],"off-chip":[124],"traffic":[126],"demand":[130],"by":[131],"enabling":[132],"fine-grained":[133],"data":[134],"reuse.":[135],"Leveraging":[136],"proposed":[138],"datapath,":[139],"introduce":[141],"FAME,":[142],"FPGA-based":[145],"accelerator":[146],"specifically":[147],"tailored":[148],"FAME":[152,170,188],"supports":[153],"arbitrary":[154],"shapes":[156],"configurable":[159],"wide":[162],"range":[163],"parameter":[166],"sets.":[167],"implement":[169],"Alveo":[172],"U280":[173],"performance":[177],"over":[178,198],"diverse":[179],"sizes":[181],"shapes.":[183],"Experimental":[184],"results":[185],"show":[186],"achieves":[189],"an":[190],"average":[191],"<tex":[193],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[194],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$221":[195],"\\times$</tex>":[196],"speedup":[197],"state-of-the-art":[199],"CPU-based":[200],"implementations,":[201],"demonstrating":[202],"scalability":[204],"practicality":[206],"large-scale":[208],"consecutive":[209],"real-world":[213],"workloads.":[214]},"counts_by_year":[],"updated_date":"2026-03-28T06:11:35.319607","created_date":"2026-03-27T00:00:00"}
