{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:25:44Z","timestamp":1775251544059,"version":"3.50.1"},"publisher-location":"New York, New York, USA","reference-count":37,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Directorate"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3267973.3267977","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T08:56:36Z","timestamp":1539680196000},"page":"13-24","source":"Crossref","is-referenced-by-count":5,"title":["High-Throughput Secure AES Computation"],"prefix":"10.1145","author":[{"given":"Koji","family":"Chida","sequence":"first","affiliation":[{"name":"NTT, Tokyo, Japan"}]},{"given":"Koki","family":"Hamada","sequence":"additional","affiliation":[{"name":"NTT, Tokyo, Japan"}]},{"given":"Dai","family":"Ikarashi","sequence":"additional","affiliation":[{"name":"NTT, Tokyo, Japan"}]},{"given":"Ryo","family":"Kikuchi","sequence":"additional","affiliation":[{"name":"NTT, Tokyo, Japan"}]},{"given":"Benny","family":"Pinkas","sequence":"additional","affiliation":[{"name":"Bar-Ilan University, Ramat Gan, Japan"}]}],"member":"320","reference":[{"key":"key-10.1145\/3267973.3267977-1","unstructured":"Kazumaro Aoki and Helger Lipmaa. 2000. Fast Implementations of AES Candidates. In Third AES Candidate Conference ."},{"key":"key-10.1145\/3267973.3267977-2","doi-asserted-by":"crossref","unstructured":"Toshinori Araki, Assi Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, and Or Weinstein. 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE Symposium on Security and Privacy, SP 2017 .","DOI":"10.1109\/SP.2017.15"},{"key":"key-10.1145\/3267973.3267977-3","doi-asserted-by":"crossref","unstructured":"Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In ACM CCS. 805--817.","DOI":"10.1145\/2976749.2978331"},{"key":"key-10.1145\/3267973.3267977-4","unstructured":"Donald Beaver, Silvio Micali, and Phillip Rogaway. 1990. The Round Complexity of Secure Protocols (Extended Abstract). In Proceedings of the 22nd Annual ACM Symposium on Theory of Computing,. 503--513."},{"key":"key-10.1145\/3267973.3267977-5","doi-asserted-by":"crossref","unstructured":"Aner Ben-Efraim, Yehuda Lindell, and Eran Omri. 2016. Optimizing Semi-Honest Secure Multiparty Computation for the Internet. In ACM CCS. 578--590.","DOI":"10.1145\/2976749.2978347"},{"key":"key-10.1145\/3267973.3267977-6","doi-asserted-by":"crossref","unstructured":"Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. 1988. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract). In STOC. 1--10.","DOI":"10.1145\/62212.62213"},{"key":"key-10.1145\/3267973.3267977-7","doi-asserted-by":"crossref","unstructured":"Daniel J. Bernstein and Peter Schwabe. 2008. New AES Software Speed Records. In INDOCRYPT 2008. 322--336.","DOI":"10.1007\/978-3-540-89754-5_25"},{"key":"key-10.1145\/3267973.3267977-8","doi-asserted-by":"crossref","unstructured":"Dan Bogdanov, Sven Laur, and Jan Willemson. 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations. In ESORICS . 192--206.","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"key-10.1145\/3267973.3267977-9","unstructured":"Dan Bogdanov, Marko J oemets, Sander Siim, and Meril Vaht. 2016. Privacy-preserving tax fraud detection in the cloud with realistic data volumes. Cybernetica research report."},{"key":"key-10.1145\/3267973.3267977-10","unstructured":"Joan Boyar and Ren&#233; Peralta. 2010. A New Combinational Logic Minimization Technique with Applications to Cryptology. In SEA 2010, . 178--189."},{"key":"key-10.1145\/3267973.3267977-11","doi-asserted-by":"crossref","unstructured":"Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In FOCS . 136--145.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"key-10.1145\/3267973.3267977-12","doi-asserted-by":"crossref","unstructured":"David Chaum, Claude Cr&#233;peau, and Ivan Damg&#229;rd. 1988. Multiparty Unconditionally Secure Protocols (Extended Abstract). In STOC . 11--19.","DOI":"10.1145\/62212.62214"},{"key":"key-10.1145\/3267973.3267977-13","unstructured":"Ronald Cramer, Ivan Damg&#229;rd, and Yuval Ishai. 2005. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. In TCC . 342--362."},{"key":"key-10.1145\/3267973.3267977-14","doi-asserted-by":"crossref","unstructured":"Ivan Damg&#229;rd and Marcel Keller. 2010. Secure Multiparty AES. In FC. 367--374.","DOI":"10.1007\/978-3-642-14577-3_31"},{"key":"key-10.1145\/3267973.3267977-15","doi-asserted-by":"crossref","unstructured":"Ivan Damg&#229;rd, Marcel Keller, Enrique Larraia, Christian Miles, and Nigel P. Smart. 2012. Implementing AES via an Actively\/Covertly Secure Dishonest-Majority MPC Protocol. In SCN . 241--263.","DOI":"10.1007\/978-3-642-32928-9_14"},{"key":"key-10.1145\/3267973.3267977-16","doi-asserted-by":"crossref","unstructured":"Ivan Damg&#229;rd, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, and Nigel P. Smart. 2013. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits. In ESORICS. 1--18.","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"key-10.1145\/3267973.3267977-17","doi-asserted-by":"crossref","unstructured":"Morris Dworkin. 2001. Recommendation for block cipher modes of operation. methods and techniques . Technical Report. DTIC Document.","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"key-10.1145\/3267973.3267977-18","unstructured":"Niels Ferguson and Bruce Schneier. 2003. Practical Cryptography .John Wiley &#38; Sons."},{"key":"key-10.1145\/3267973.3267977-19","doi-asserted-by":"crossref","unstructured":"Jun Furukawa, Yehuda Lindell, Ariel Nof, and Or Weinstein. 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT 2017. 225--255.","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"key-10.1145\/3267973.3267977-20","unstructured":"Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2, Basic Applications .Cambridge University Press."},{"key":"key-10.1145\/3267973.3267977-21","doi-asserted-by":"crossref","unstructured":"Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In STOC. 218--229.","DOI":"10.1145\/28395.28420"},{"key":"key-10.1145\/3267973.3267977-22","unstructured":"Dai Ikarashi, Ryo Kikuchi, Koki Hamada, and Koji Chida. 2014. Actively Private and Correct MPC Scheme in $t<n\/2$ from Passively Secure Schemes with Small Overhead. IACR Cryptology ePrint Archive , Vol. 2014 (2014), 304."},{"key":"key-10.1145\/3267973.3267977-23","unstructured":"Mitsuru Ito, Akira Saito, and Takao Nishizeki. 1989. Secret sharing scheme realizing general access structure. IEICE Transactions , Vol. 72 (1989), 56--64. Issue 9."},{"key":"key-10.1145\/3267973.3267977-24","unstructured":"Sriram Keelveedhi, Mihir Bellare, and Thomas Ristenpart. 2013. DupLESS: Server-Aided Encryption for Deduplicated Storage. In USENIX Security . 179--194."},{"key":"key-10.1145\/3267973.3267977-25","doi-asserted-by":"crossref","unstructured":"Marcel Keller, Peter Scholl, and Nigel P. Smart. 2013. An architecture for practical actively secure MPC with dishonest majority. In ACM CCS. 549--560.","DOI":"10.1145\/2508859.2516744"},{"key":"key-10.1145\/3267973.3267977-26","unstructured":"Eizen Kimura, Koki Hamada, Ryo Kikuchi, Koji Chida, Kazuya Okamoto, Shirou Manabe, Tomohiro Kuroda, Yasushi Matsumura, Toshihiro Takeda, and Naoki Mihara. 2016. Evaluation of Secure Computation in a Distributed Healthcare Setting. In Proceedings of MIE2016 at HEC2016. 152--156."},{"key":"key-10.1145\/3267973.3267977-27","doi-asserted-by":"crossref","unstructured":"John Launchbury, Iavor S. Diatchki, Thomas DuBuisson, and Andy Adams-Moran. 2012. Efficient lookup-table protocol in secure multiparty computation. In ACM ICFP. 189--200.","DOI":"10.1145\/2398856.2364556"},{"key":"key-10.1145\/3267973.3267977-28","doi-asserted-by":"crossref","unstructured":"Sven Laur, Riivo Talviste, and Jan Willemson. 2013. From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. In ACNS. 84--101.","DOI":"10.1007\/978-3-642-38980-1_6"},{"key":"key-10.1145\/3267973.3267977-29","doi-asserted-by":"crossref","unstructured":"Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, and Sai Sheshank Burra. 2012. A New Approach to Practical Active-Secure Two-Party Computation. In CRYPTO. 681--700.","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"key-10.1145\/3267973.3267977-30","doi-asserted-by":"crossref","unstructured":"NIST. 2001. Announcing the ADVANCED ENCRYPTION STANDARD (AES) . Technical Report. https:\/\/doi.org\/10.6028\/NIST.FIPS.197.","DOI":"10.6028\/NIST.FIPS.197"},{"key":"key-10.1145\/3267973.3267977-31","unstructured":"Michael Palmer. 2012. Hands-on networking fundamentals .Cengage learning."},{"key":"key-10.1145\/3267973.3267977-32","doi-asserted-by":"crossref","unstructured":"Benny Pinkas, Thomas Schneider, Nigel P. Smart, and Stephen C. Williams. 2009. Secure Two-Party Computation Is Practical. In ASIACRYPT. 250--267.","DOI":"10.1007\/978-3-642-10366-7_15"},{"key":"key-10.1145\/3267973.3267977-33","unstructured":"Peter Rindal and Mike Rosulek. 2016. Faster Malicious 2-Party Secure Computation with Online\/Offline Dual Execution. In USENIX Security. 297--314."},{"key":"key-10.1145\/3267973.3267977-34","doi-asserted-by":"crossref","unstructured":"Justine Sherry, Chang Lan, Raluca Ada Popa, and Sylvia Ratnasamy. 2015. BlindBox: Deep Packet Inspection over Encrypted Traffic. In SIGCOMM. 213--226.","DOI":"10.1145\/2829988.2787502"},{"key":"key-10.1145\/3267973.3267977-35","unstructured":"Riivo Talviste. 2016. Applying Secure Multi-Party Computation in Practice . Ph.D. Dissertation. University of Tartu."},{"key":"key-10.1145\/3267973.3267977-36","doi-asserted-by":"crossref","unstructured":"Andrew Chi-Chih Yao. 1986. How to Generate and Exchange Secrets (Extended Abstract). In FOCS. 162--167.","DOI":"10.1109\/SFCS.1986.25"},{"key":"key-10.1145\/3267973.3267977-37","doi-asserted-by":"crossref","unstructured":"Samee Zahur, Mike Rosulek, and David Evans. 2015. Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates. In EUROCRYPT. 220--250.","DOI":"10.1007\/978-3-662-46803-6_8"}],"event":{"name":"the 6th Workshop","location":"Toronto, Canada","acronym":"WAHC '18","number":"6","sponsor":["SIGSAC, ACM Special Interest Group on Security, Audit, and Control"],"start":{"date-parts":[[2018,10,15]]},"end":{"date-parts":[[2018,10,19]]}},"container-title":["Proceedings of the 6th Workshop on Encrypted Computing &amp; Applied Homomorphic Cryptography - WAHC '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3267973.3267977","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3267977&ftid=2008842&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:15:38Z","timestamp":1775247338000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3267973.3267977"}},"subtitle":[],"proceedings-subject":"Encrypted Computing & Applied Homomorphic Cryptography","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1145\/3267973.3267977","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}