What are Reference Workloads?

Reference workloads are pre-built, production-ready encrypted compute applications that demonstrate the power of Fully Homomorphic Encryption in real-world scenarios. These workloads are fully functional, optimized, and ready to deploy, serving as both practical solutions and examples of best practices for encrypted compute.

Each reference workload is built on LatticaAI's platform, leveraging HEAL (Homomorphic Encryption Abstraction Layer) and GPU-accelerated FHE to deliver exceptional performance while maintaining complete data privacy. Whether you need a ready-to-use solution or want to build something custom, our extensible architecture makes it easy.

Extensible Architecture

Build custom encrypted workloads tailored to your specific needs

SDK & APIs

Comprehensive SDKs & APIs

Use our multi-language SDKs and RESTful APIs to integrate encrypted compute into your applications. Full documentation and developer tools included.

Custom Development

Custom Workload Development

Build your own encrypted workloads using our platform infrastructure. Leverage HEAL's tensor-based interface for hardware-agnostic optimization.

Flexible Deployment

Flexible Deployment

Deploy workloads on our hosted infrastructure or integrate with your own systems. Full control over deployment and scaling.

Join the Deployment Client Waitlist

Get early access to our deployment client that allows you to define and manage your own encrypted workloads

What to Expect

  • Early access to the deployment client
  • Priority support and onboarding
  • Direct access to our engineering team
  • Regular updates on new features

Interactive Demo

Experience encrypted compute in action with our interactive demonstration

Try Encrypted Compute

Our interactive demo allows you to experience encrypted workloads firsthand. See how data remains encrypted throughout computation, with results decrypted only on your device.

Demo

Interactive Demo Coming Soon

We're building an interactive demo that will let you experience encrypted compute in real-time. Check back soon!

Get Notified

Supported Workloads Catalog

Explore our catalog of production-ready encrypted workloads

Vector Database
📊

Encrypted Vector Database

Perform similarity searches and queries on encrypted vector data. Perfect for encrypted semantic search, recommendation systems, and RAG (Retrieval-Augmented Generation) applications.

  • Encrypted similarity search
  • Privacy-preserving queries
  • Scalable architecture
  • Production-ready
Learn More
ML Inference
🤖

Encrypted ML Inference

Run machine learning inference on encrypted data. Supports non-generative models including classification, regression, and other predictive models while keeping data and queries private.

  • Encrypted model inference
  • Non-generative ML models
  • Zero data exposure
  • High-performance execution
Learn More
Analytics
📈

Encrypted Analytics

Perform statistical analysis and aggregations on encrypted datasets. Compute sums, averages, correlations, and other analytics without exposing raw data.

  • Encrypted aggregations
  • Statistical computations
  • Privacy-preserving analytics
  • Batch processing support
Learn More
Secure Computation
🔒

Custom Encrypted Workloads

Build your own encrypted workloads using our extensible platform. Define custom computation logic while leveraging our FHE infrastructure and optimization.

  • Custom computation logic
  • Full platform access
  • SDK and API support
  • Developer resources
View Docs

Ready to Get Started?

Explore our workloads, join the waitlist, or contact us to discuss your specific needs