About:

Jeremy Kun is a staff software engineer at Google with a PhD in mathematics. He is an author and blogger with interests in mathematics, computer science, and homomorphic encryption.

Website:

Specializations:

Interests:

Mathematics Computer Science Software Engineering Homomorphic Encryption

Incoming Links:

Outgoing Links:

Jonas Hietala
Subscribe to RSS:
This article discusses the bicyclic method for matrix-matrix multiplication in fully homomorphic encryption (FHE), building on previous work on the Halevi-Shoup diagonal method. It explains the computational model of SIMD-style FH...
This article provides an overview of the Integer Set Library (ISL), focusing on its application in polyhedral optimization for compilers, particularly in optimizing loop nests. It discusses the representation of integer sets and r...
This article provides a collection of answers to frequently asked questions about fully homomorphic encryption (FHE), addressing both factual and opinion-based queries. Key points include the security of FHE against quantum comput...
The author hosted a mini-workshop on homomorphic encryption in Portland, Oregon, bringing together about 18 attendees from various companies, including Intel and Google. The event focused on fostering community through informal ta...
The text discusses Edsger Dijkstra's speech 'Under the spell of Leibniz’s Dream' and his views on the practicality of beautiful theories in the design of digital systems. Dijkstra praises ALGOL 60 for its elegance and innovations,...
The text is a detailed account of the author's experiences during his graduate career in mathematics, including his struggles with the academic system, his coursework, his teaching experiences, and his research projects.
...
The text discusses the importance of addressing small-batch tech problems and the impact of technology on people's lives. It highlights the need for immediate and consistent value delivery, and the importance of building self-reli...
The author's 4-year-old son has declared 36 to be the best number because it is both a square and a staircase number. The son's interest in math was fostered by watching Numberblocks and reading Beast Academy comic books. The auth...
The author discusses the Caratheodory-Fejer method as an alternative to the Remez algorithm for polynomial approximation. They describe their experience with the Remez algorithm and their colleague's implementation of the Caratheo...
The author discusses their experience working on a side project related to human-level explanations of linear programs in the supply chain side of Google. They explain the challenges of understanding the behavior of linear program...

0I'll be at the JMM

2025-01-08

The author will be attending the Joint Mathematics Meeting in Seattle and invites people to say hi. They will have a light schedule and will be attending crypto sessions for homomorphic encryption talks. Additionally, they will be...
The podcast episode discusses the limitations of physical measurement at small scales, highlighting the gap between theory and practice. It emphasizes the ambiguity in measuring physical objects due to their inherent width and the...
The text discusses public reactions to the use of homomorphic encryption, particularly in response to Apple's Enhanced Visual Search feature. It includes a blog post by software engineer Jeff Johnson criticizing Apple for violatin...
The author discusses the progress of the HEIR project, a compiler toolchain for fully homomorphic encryption (FHE), and the collaborations and developments that have taken place in the field. The focus is on hardware accelerators,...
The blog post discusses the importance of storytelling in teaching mathematical reasoning skills to children. The author shares personal anecdotes and examples to illustrate how storytelling can make math more accessible and less ...
The 233rd Carnival of Mathematics covers a variety of topics, including the discovery of a new largest known prime number, the disproof of the bunkbed conjecture, and various mathematical topics covered in podcasts, videos, and bl...
The article explains how the blog is organized at a technical level and shows how various IndieWeb features are implemented. It covers motivation, structure and deployment, static search index, running scripts via GitHub Actions, ...
Kristin Lauter and her colleagues at Facebook Research announced a project to benchmark attacks against LWE, motivated by the need to study the effect on security of using small secrets and small error in standardized LWE settings...
The blog post narrates an attempt to apply dynamic programming to a woodworking project, specifically in building a shed floor using 2x4 and 2x6 planks. The author initially thought of solving the problem of filling a given width ...
The blog post discusses the importance of data layout when working with arithmetic homomorphic encryption schemes, focusing on the topic of packing. It covers two basic packing techniques for matrix-vector multiplication, the Hale...

0Shift Networks

2024-09-02

The blog post discusses the importance of data layout, known as 'packing,' in SIMD-style homomorphic encryption schemes. Packing is crucial for performance and involves placing multiple plaintext data into RLWE ciphertexts to mini...
The blog post discusses the author's implementation of webmentions using webmention.io and webmention.js, and improvements to their POSSE (Publish (on your) Own Site, Syndicate Elsewhere) system. The author has enabled shortform p...
The blog post is about using PDLL, a tool for defining MLIR patterns, which itself is built with MLIR. PDLL is intended to be a replacement for defining patterns in tablegen. The post explains the syntax and usage of PDLL, and how...