ASPLOS 2026 Tutorial

Cryptography Primitives Acceleration (CPA Tutorial)

Mar 22: Morning @ ASPLOS'26

Artificial Intelligence (AI) is driving a new industrial revolution, transforming how we create, exchange, and safeguard information. From chatbots and autonomous vehicles to enterprise assistants and AI coders, human workflows are increasingly translated into digital tokens—a process that makes the world effectively tokenized. Yet this transformation exposes sensitive data at an unprecedented scale, making privacy preservation a defining challenge of the AI era. Current privacy solutions, however, remain prohibitively expensive. Software-based encryption can slow computation by 100–10,000×, while hardware isolation demands millions of dollar fabrication costs. These barriers make privacy protection over prohibitive, leaving the broader AI revolution unprotected. This tutorial gives you a tour of the state-of-the-art in cryptography primitives acceleration, and how to make privacy protection as efficient and accessible as unprotected AI.

In this tutorial, you will learn:

  • (a) How to convert an AI model into Homomorphic Encryption (HE), enabling privacy-preserving AI inference, and how to make a compiler to do so?
  • (b) How to deploy HE on TPU hardware to achieve SotA throughput and energy efficiency?
  • (c) How to further extend HE to arbitrary-precision cryptography primitives, enabling Zero-Knowledge Proofs (ZKPs)?
  • (d) How to write high-performance JAX kernels, optimize them to run on distributed TPUs?
Overarching Figure of the Repository

Figure 1: CPA overview, turning TPU as a crypto accelerator, achieving SoTA throughput and energy efficiency.

CPA Resources

Agenda (Mar 22, 2026, ASPLOS'26)

9:00 AM ~ 9:05 AM

Welcome

9:05 AM ~ 9:50 AM

Keynote: Privacy-Preserving AI Computing

9:50 AM ~ 10:00 AM

Introduction to Verifiable Privacy-preserving AI via HE and ZKP

Overview of HE compilation stacks.

10:00 AM ~ 10:30 AM

HEIR Compiler – Encrypt Model with better Performance / less Accuracy Degradation

  • Overview of components for compiling ML models
  • Hands on: Model rearchitecture
  • Hands on: Arithmetization (polynomial approximation, packing/kernel selection)
  • Hands on: Scheme selection, noise analysis, ciphertext management
  • Hands on: Accuracy degradation considerations
  • Hands on: Differences among schemes (CGGI, CKKS/BGV/BFV)
  • Hands on: Life cycle of model compilation using CKKS
  • Hands on: Export to jaxite (CROSS)
Break (10:30 AM ~ 11:00 AM)
11:00 AM ~ 11:40 AM

CROSS – Enabling Google TPU for Homomorphic Encryption

Memory, Computation and Accuracy overhead of Cryptography primitives (HE and ZKP).

TPU-specific Memory and Compute Optimizations for HE.

  • Hands on: Encode, Encryption, Decryption, Decode
  • Hands on: HE Kernels (HEAdd, HEMul, HERotation, HERescale, NTT, Keyswitch)
  • Hands on: Parameter Selection (32-bit logq, extended via rescaling)
  • Hands on: MNIST inference benchmark
  • Hands on: Similarity search benchmark
11:40 AM ~ 12:00 PM

MORPH – Enabling Google TPU for ZKP

TPU-specific Memory and Compute Optimizations for Multi-scalar Multiplication.

  • Hands on: Efficient Modular Reduction and Multiplication for Big Integers (>256 bits)
  • Hands on: Different dataflow choices (Bucket-level, Window-level, Hybrid parallelism)
12:00 PM ~ 12:20 PM

Hardware – Intel’s FHE Accelerator ASIC HERACLES

High-level overview of architecture and ISA, Polynomial ISA, Memory sub-system, formatting.

  • Hands on: Kernel generation using Encrypted Computing SDK
  • Hands on: Simulation of functional correctness and performance estimation
  • Hands on: All basic FHE operations and MNIST inference benchmark
12:20 PM ~ 12:25 PM

Future Work / Discussion / Call for action

Organizers

Citation

If you find this tutorial helpful, feel free to:

@inproceedings{tong2025CROSS,
author = {Jianming Tong and Tianhao Huang and Jingtian Dang and Leo de Castro and Anirudh Itagi and Anupam
Golder and Asra Ali and Jevin Jiang and Jeremy Kun and Arvind and G. Edward Suh and Tushar Krishna},
title = {Leveraging ASIC AI Chips for Homomorphic Encryption},
year = {2026},
publisher = {2026 IEEE International Symposium on High Performance Computer Architecture (HPCA)},
address = {Australia},
keywords = {AI ASICs, TPU, Fully Homomorphic Encryption},
location = {Australia},
series = {HPCA'26} }
@misc{ali2025heiruniversalcompilerhomomorphic,
title={HEIR: A Universal Compiler for Homomorphic Encryption}, 
author={Asra Ali and Jaeho Choi and Bryant Gipson and Shruthi Gorantala and Jeremy Kun and Wouter Legiest and Lawrence Lim and Alexander Viand and Meron Zerihun Demissie and Hongren Zheng},
year={2025},
eprint={2508.11095},
archivePrefix={arXiv},
primaryClass={cs.CR},
url={https://arxiv.org/abs/2508.11095}, 
}