{"id":2,"date":"2025-11-05T19:52:23","date_gmt":"2025-11-05T19:52:23","guid":{"rendered":"https:\/\/www.isi.edu\/projects-trebuchet\/?page_id=2"},"modified":"2025-11-07T00:59:14","modified_gmt":"2025-11-07T00:59:14","slug":"sample-page","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/projects-trebuchet\/","title":{"rendered":"Home"},"content":{"rendered":"\n\n\t<h2>Overview<\/h2>\n<p>Recent advances in cryptography-most notably Fully Homomorphic Encryption (FHE)-now allow computation to be performed directly on encrypted data, removing the need to decrypt sensitive information for analysis and thereby reducing opportunities for exposure. However, FHE is extremely computationally intensive (on the order of 100,000\u00d7 more work than unencrypted processing), which limits practical use. The TREBUCHET custom co-processor aims at accelerating FHE workloads and narrowing the performance gap to roughly ten times that of traditional processing.<\/p>\n\t<h2>Latest News<\/h2>\n<div class=\"news mt-0 p-0 fl-content col-12\"><div class=\"lead-story\">\n                <div class=\"row\">\n                    <a href=\"https:\/\/www.isi.edu\/news\/52593\/trebuchet-a-high-powered-processor-for-cutting-edge-encryption\" target=\"_blank\">\n                        <article class=\"col-12\">\n                            <figure>\n                                <img decoding=\"async\" src=\"https:\/\/viterbischool.usc.edu\/wp-content\/uploads\/2022\/11\/Trebuchet-1200.jpg\" alt=\"circuit\">\n                            <\/figure>\n                            <div class=\"content\">\n                                <div class=\"heading\">TREBUCHET: A High-Powered Processor for Cutting-Edge Encryption<\/div>\n                                <p>Researchers from USC Viterbi\u2019s Information Sciences Institute are part of a team working to keep sensitive data secure with accelerated computing.\u00a0\r\n<\/p>\n                            <\/div>\n                        <\/article>\n                    <\/a>\n                <\/div>\n            <\/div><\/div>\n\t<h2>Sponsors<\/h2>\n<p><a href=\"https:\/\/www.darpa.mil\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/projects-trebuchet\/wp-content\/uploads\/sites\/77\/2025\/11\/darpa-logo.png\" alt=\"DARPA\" \/><\/a><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Overview Recent advances in cryptography-most notably Fully Homomorphic Encryption (FHE)-now allow computation to be performed directly on encrypted data, removing the need to decrypt sensitive information for analysis and thereby reducing opportunities for exposure. However, FHE is extremely computationally intensive (on the order of 100,000\u00d7 more work than unencrypted processing), which limits practical use. The&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-2","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/projects-trebuchet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration\" \/>\n<meta property=\"og:description\" content=\"Overview Recent advances in cryptography-most notably Fully Homomorphic Encryption (FHE)-now allow computation to be performed directly on encrypted data, removing the need to decrypt sensitive information for analysis and thereby reducing opportunities for exposure. However, FHE is extremely computationally intensive (on the order of 100,000\u00d7 more work than unencrypted processing), which limits practical use. The&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/projects-trebuchet\/\" \/>\n<meta property=\"og:site_name\" content=\"TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T00:59:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isi.edu\/projects-trebuchet\/\",\"url\":\"https:\/\/www.isi.edu\/projects-trebuchet\/\",\"name\":\"Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration\",\"isPartOf\":{\"@id\":\"https:\/\/www.isi.edu\/projects-trebuchet\/#website\"},\"datePublished\":\"2025-11-05T19:52:23+00:00\",\"dateModified\":\"2025-11-07T00:59:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isi.edu\/projects-trebuchet\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isi.edu\/projects-trebuchet\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isi.edu\/projects-trebuchet\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isi.edu\/projects-trebuchet\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isi.edu\/projects-trebuchet\/#website\",\"url\":\"https:\/\/www.isi.edu\/projects-trebuchet\/\",\"name\":\"TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isi.edu\/projects-trebuchet\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/projects-trebuchet\/","og_locale":"en_US","og_type":"article","og_title":"Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration","og_description":"Overview Recent advances in cryptography-most notably Fully Homomorphic Encryption (FHE)-now allow computation to be performed directly on encrypted data, removing the need to decrypt sensitive information for analysis and thereby reducing opportunities for exposure. However, FHE is extremely computationally intensive (on the order of 100,000\u00d7 more work than unencrypted processing), which limits practical use. The&hellip;","og_url":"https:\/\/www.isi.edu\/projects-trebuchet\/","og_site_name":"TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration","article_modified_time":"2025-11-07T00:59:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/projects-trebuchet\/","url":"https:\/\/www.isi.edu\/projects-trebuchet\/","name":"Home - TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration","isPartOf":{"@id":"https:\/\/www.isi.edu\/projects-trebuchet\/#website"},"datePublished":"2025-11-05T19:52:23+00:00","dateModified":"2025-11-07T00:59:14+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/projects-trebuchet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/projects-trebuchet\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/projects-trebuchet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/projects-trebuchet\/"},{"@type":"ListItem","position":2,"name":"Home"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/projects-trebuchet\/#website","url":"https:\/\/www.isi.edu\/projects-trebuchet\/","name":"TREBUCHET: Fully Homomorphic Encryption (FHE) Acceleration","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/projects-trebuchet\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/pages\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/projects-trebuchet\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}