{"id":"https://openalex.org/W3012235108","doi":"https://doi.org/10.1145/3373376.3378523","title":"HEAX","display_name":"HEAX","publication_year":2020,"publication_date":"2020-03-09","ids":{"openalex":"https://openalex.org/W3012235108","doi":"https://doi.org/10.1145/3373376.3378523","mag":"3012235108"},"language":"en","primary_location":{"id":"doi:10.1145/3373376.3378523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3373376.3378523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001171298","display_name":"M. Sadegh Riazi","orcid":"https://orcid.org/0000-0002-6316-4649"},"institutions":[{"id":"https://openalex.org/I36258959","display_name":"University of California, San Diego","ror":"https://ror.org/0168r3w48","country_code":"US","type":"education","lineage":["https://openalex.org/I36258959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"M. Sadegh Riazi","raw_affiliation_strings":["University of California, San Diego, La Jolla, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, San Diego, La Jolla, CA, USA","institution_ids":["https://openalex.org/I36258959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012602812","display_name":"Kim Laine","orcid":"https://orcid.org/0000-0002-9087-5913"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim Laine","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017047137","display_name":"Blake Pelton","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Blake Pelton","raw_affiliation_strings":["Microsoft, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101595453","display_name":"Wei Dai","orcid":"https://orcid.org/0000-0002-3542-8889"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Dai","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001171298"],"corresponding_institution_ids":["https://openalex.org/I36258959"],"apc_list":null,"apc_paid":null,"fwci":17.533,"has_fulltext":false,"cited_by_count":225,"citation_normalized_percentile":{"value":0.99387116,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1295","last_page":"1309"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7618540525436401},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6803800463676453},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6348174810409546},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6175801753997803},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6123311519622803},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5790796279907227},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.46336624026298523},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4228697717189789},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.41556739807128906},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3907873034477234},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3648633062839508},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.29781365394592285},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2971119284629822},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16699394583702087},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09677568078041077}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7618540525436401},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6803800463676453},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6348174810409546},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6175801753997803},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6123311519622803},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5790796279907227},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.46336624026298523},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4228697717189789},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.41556739807128906},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3907873034477234},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3648633062839508},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29781365394592285},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2971119284629822},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16699394583702087},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09677568078041077},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3373376.3378523","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3373376.3378523","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5199999809265137,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W166833272","https://openalex.org/W1498685334","https://openalex.org/W1556212265","https://openalex.org/W1572300106","https://openalex.org/W1992282993","https://openalex.org/W1994457675","https://openalex.org/W2026935019","https://openalex.org/W2031533839","https://openalex.org/W2042872772","https://openalex.org/W2043088506","https://openalex.org/W2048994663","https://openalex.org/W2061139471","https://openalex.org/W2069692482","https://openalex.org/W2070982178","https://openalex.org/W2091895466","https://openalex.org/W2098611419","https://openalex.org/W2107956745","https://openalex.org/W2109026747","https://openalex.org/W2136080590","https://openalex.org/W2152926062","https://openalex.org/W2217245185","https://openalex.org/W2233194383","https://openalex.org/W2245734289","https://openalex.org/W2246684855","https://openalex.org/W2287312583","https://openalex.org/W2295445672","https://openalex.org/W2309997581","https://openalex.org/W2396301548","https://openalex.org/W2415881634","https://openalex.org/W2435473771","https://openalex.org/W2467320551","https://openalex.org/W2527617455","https://openalex.org/W2537286916","https://openalex.org/W2544955103","https://openalex.org/W2554750353","https://openalex.org/W2741749840","https://openalex.org/W2759027818","https://openalex.org/W2768174108","https://openalex.org/W2792565434","https://openalex.org/W2795187181","https://openalex.org/W2885339274","https://openalex.org/W2889746123","https://openalex.org/W2896938420","https://openalex.org/W2898205232","https://openalex.org/W2899140612","https://openalex.org/W2930551714","https://openalex.org/W2934510082","https://openalex.org/W2950700143","https://openalex.org/W3028867652","https://openalex.org/W3030053264","https://openalex.org/W4236580217","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2625655658","https://openalex.org/W2947510282","https://openalex.org/W2363701519","https://openalex.org/W2292786713","https://openalex.org/W3212491810","https://openalex.org/W2887779253"],"abstract_inverted_index":{"With":[0],"the":[1,39,75,85],"rapid":[2],"increase":[3],"in":[4,32,59,79,143],"cloud":[5,21],"computing,":[6],"concerns":[7],"surrounding":[8],"data":[9,35,69],"privacy,":[10],"security,":[11],"and":[12,27],"confidentiality":[13],"also":[14,31],"have":[15],"been":[16],"increased":[17],"significantly.":[18],"Not":[19],"only":[20],"providers":[22],"are":[23],"susceptible":[24],"to":[25,42,115],"internal":[26],"external":[28],"hacks,":[29],"but":[30],"some":[33],"scenarios,":[34],"owners":[36],"cannot":[37],"outsource":[38],"computation":[40,66,87,160],"due":[41],"privacy":[43],"laws":[44],"such":[45],"as":[46,138],"GDPR,":[47],"HIPAA,":[48],"or":[49],"CCPA.":[50],"Fully":[51],"Homomorphic":[52],"Encryption":[53],"(FHE)":[54],"is":[55,84,123,140],"a":[56,95,124,156,175],"groundbreaking":[57],"invention":[58],"cryptography":[60,146],"that,":[61],"unlike":[62],"traditional":[63],"cryptosystems,":[64],"enables":[65],"on":[67,149,161,167],"encrypted":[68,163],"without":[70],"ever":[71],"decrypting":[72],"it.":[73],"However,":[74],"most":[76],"critical":[77],"obstacle":[78],"deploying":[80],"FHE":[81,100,179],"at":[82],"large-scale":[83],"enormous":[86],"overhead.":[88],"In":[89],"this":[90],"paper,":[91],"we":[92,154],"present":[93],"HEAX,":[94],"novel":[96,157],"hardware":[97,169],"architecture":[98,127,158],"for":[99,128,159,174],"that":[101],"achieves":[102],"unprecedented":[103],"performance":[104,172],"improvements.":[105],"HEAX":[106],"leverages":[107],"multiple":[108],"levels":[109],"of":[110,135,151,178],"parallelism,":[111],"ranging":[112],"from":[113],"ciphertext-level":[114],"fine-grained":[116],"modular":[117],"arithmetic":[118],"level.":[119],"Our":[120,165],"first":[121],"contribution":[122],"new":[125],"highly-parallelizable":[126],"number-theoretic":[129],"transform":[130],"(NTT)":[131],"which":[132],"can":[133],"be":[134],"independent":[136],"interest":[137],"NTT":[139,152],"frequently":[141],"used":[142],"many":[144],"lattice-based":[145],"systems.":[147],"Building":[148],"top":[150],"engine,":[153],"design":[155],"homomorphically":[162],"data.":[164],"implementation":[166],"reconfigurable":[168],"demonstrates":[170],"164-268\u00d7":[171],"improvement":[173],"wide":[176],"range":[177],"parameters.":[180]},"counts_by_year":[{"year":2026,"cited_by_count":14},{"year":2025,"cited_by_count":34},{"year":2024,"cited_by_count":48},{"year":2023,"cited_by_count":53},{"year":2022,"cited_by_count":36},{"year":2021,"cited_by_count":30},{"year":2020,"cited_by_count":10}],"updated_date":"2026-04-23T09:07:50.710637","created_date":"2020-03-23T00:00:00"}
