default search action
Kristin E. Lauter
Person information
- affiliation: Microsoft Research, Redmond
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j33]François Charton, Kristin E. Lauter, Cathy Yuanchen Li, Mark Tygert:
An Efficient Algorithm for Integer Lattice Reduction. SIAM J. Matrix Anal. Appl. 45(1): 353-367 (2024) - [c41]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The Cool and the Cruel: Separating Hard Parts of LWE Secrets. AFRICACRYPT 2024: 428-453 - [i101]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. CoRR abs/2402.01082 (2024) - [i100]Kristin E. Lauter, Cathy Yuanchen Li, Krystal Maughan, Rachel Newton, Megha Srivastava:
Machine learning for modular multiplication. CoRR abs/2402.19254 (2024) - [i99]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. CoRR abs/2403.10328 (2024) - [i98]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. CoRR abs/2408.00882 (2024) - [i97]Eshika Saxena, Alberto Alfarano, Emily Wenger, Kristin E. Lauter:
Teaching Transformers Modular Arithmetic at Scale. CoRR abs/2410.03569 (2024) - [i96]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. IACR Cryptol. ePrint Arch. 2024: 150 (2024) - [i95]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. IACR Cryptol. ePrint Arch. 2024: 443 (2024) - [i94]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. IACR Cryptol. ePrint Arch. 2024: 1229 (2024) - 2023
- [j32]Sarah Arpin, Catalina Camacho-Navarro, Kristin E. Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková:
Adventures in Supersingularland. Exp. Math. 32(2): 241-268 (2023) - [j31]Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Adam Paetznick, Christophe Petit:
Shorter quantum circuits via single-qubit gate approximation. Quantum 7: 1208 (2023) - [c40]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. CCS 2023: 2606-2620 - [c39]Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on LWE with sparse small secrets. NeurIPS 2023 - [i93]François Charton, Kristin E. Lauter, Cathy Yuanchen Li, Mark Tygert:
An efficient algorithm for integer lattice reduction. CoRR abs/2303.02226 (2023) - [i92]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. CoRR abs/2303.04178 (2023) - [i91]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets. CoRR abs/2306.11641 (2023) - [i90]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. IACR Cryptol. ePrint Arch. 2023: 340 (2023) - [i89]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets. IACR Cryptol. ePrint Arch. 2023: 968 (2023) - 2022
- [j30]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. ACM Comput. Surv. 54(9): 195:1-195:37 (2022) - [c38]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. NeurIPS 2022 - [i88]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. CoRR abs/2201.11079 (2022) - [i87]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. CoRR abs/2205.03976 (2022) - [i86]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. CoRR abs/2207.04785 (2022) - [i85]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. IACR Cryptol. ePrint Arch. 2022: 98 (2022) - [i84]Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Christophe Petit, Adam Paetznick:
Shorter quantum circuits. IACR Cryptol. ePrint Arch. 2022: 372 (2022) - [i83]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. IACR Cryptol. ePrint Arch. 2022: 562 (2022) - [i82]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. IACR Cryptol. ePrint Arch. 2022: 935 (2022) - 2021
- [j29]Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:
Editor's Preface for the Second Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 15(1): 1-3 (2021) - [i81]Miran Kim, Xiaoqian Jiang, Kristin E. Lauter, Elkhan Ismayilzada, Shayan Shams:
HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data. CoRR abs/2104.09164 (2021) - [i80]Elena Fuchs, Kristin E. Lauter, Matthew Litman, Austin Tran:
A Cryptographic Hash Function from Markoff Triples. CoRR abs/2107.10906 (2021) - [i79]Kristin E. Lauter:
Private AI: Machine Learning on Encrypted Data. IACR Cryptol. ePrint Arch. 2021: 324 (2021) - [i78]Laia Amorós, Annamaria Iezzi, Kristin E. Lauter, Chloe Martindale, Jana Sotáková:
Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees. IACR Cryptol. ePrint Arch. 2021: 372 (2021) - [i77]Elena Fuchs, Kristin E. Lauter, Matthew Litman, Austin Tran:
A Cryptographic Hash Function from Markoff Triples. IACR Cryptol. ePrint Arch. 2021: 983 (2021) - 2020
- [j28]Jung Hee Cheon, Kristin E. Lauter, Donggeon Yhee:
Preface to the First Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 14(1): 1-4 (2020) - [j27]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. J. Math. Cryptol. 14(1): 5-14 (2020) - [i76]Mingliang Chen, Aria Shahverdi, Sarah Anderson, Se Yong Park, Justin Zhang, Dana Dachman-Soled, Kristin E. Lauter, Min Wu:
Transparency Tools for Fairness in AI (Luskin). CoRR abs/2007.04484 (2020) - [i75]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. CoRR abs/2007.09270 (2020) - [i74]Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. IACR Cryptol. ePrint Arch. 2020: 539 (2020)
2010 – 2019
- 2019
- [c37]Kristin E. Lauter, Christophe Petit:
Supersingular isogeny graphs in cryptography. BCC 2019: 143-166 - [c36]Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. CCSW 2019: 117-128 - [c35]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. PLDI 2019: 142-156 - [c34]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. USENIX Security Symposium 2019: 1501-1518 - [i73]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. CoRR abs/1902.07342 (2019) - [i72]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i71]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 171 (2019) - [i70]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i69]Sarah Arpin, Catalina Camacho-Navarro, Kristin E. Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková:
Adventures in Supersingularland. IACR Cryptol. ePrint Arch. 2019: 1056 (2019) - 2018
- [j26]Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography, Part 2. IEEE Secur. Priv. 16(5): 12-13 (2018) - [j25]Bita Darvish Rouhani, Siam Umar Hussain, Kristin E. Lauter, Farinaz Koushanfar:
ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs. ACM Trans. Reconfigurable Technol. Syst. 11(3): 21:1-21:21 (2018) - [c33]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. CCS 2018: 1209-1222 - [c32]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. EUROCRYPT (3) 2018: 329-368 - [i68]Anamaria Costache, Brooke Feigon, Kristin E. Lauter, Maike Massierer, Anna Puskás:
Ramanujan graphs in cryptography. CoRR abs/1806.05709 (2018) - [i67]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i66]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs. CoRR abs/1810.00845 (2018) - [i65]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular isogeny graphs and endomorphism rings: reductions and solutions. IACR Cryptol. ePrint Arch. 2018: 371 (2018) - [i64]Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin E. Lauter:
Logistic regression over encrypted data from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2018: 462 (2018) - [i63]Anamaria Costache, Brooke Feigon, Kristin E. Lauter, Maike Massierer, Anna Puskás:
Ramanujan graphs in cryptography. IACR Cryptol. ePrint Arch. 2018: 593 (2018) - [i62]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptol. ePrint Arch. 2018: 665 (2018) - [i61]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. IACR Cryptol. ePrint Arch. 2018: 1041 (2018) - 2017
- [j24]Feng Chen, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, Süleyman Cenk Sahinalp, Chisato Shimizu, Jane C. Burns, Victoria J. Wright, Eileen Png, Martin L. Hibberd, David D. Lloyd, Hai Yang, Amalio Telenti, Cinnamon S. Bloss, Dov Fox, Kristin E. Lauter, Lucila Ohno-Machado:
PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS. Bioinform. 33(6): 871-878 (2017) - [j23]Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography - State of the Art. IEEE Secur. Priv. 15(4): 12-13 (2017) - [j22]Kristin E. Lauter:
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs. IEEE Secur. Priv. 15(4): 22-27 (2017) - [j21]Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
Manual for Using Homomorphic Encryption for Bioinformatics. Proc. IEEE 105(3): 552-567 (2017) - [j20]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search RLWE Problem with Small Errors. SIAM J. Appl. Algebra Geom. 1(1): 665-682 (2017) - [c31]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. ASIACRYPT (2) 2017: 241-270 - [i60]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum resource estimates for computing elliptic curve discrete logarithms. CoRR abs/1706.06752 (2017) - [i59]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security considerations for Galois non-dual RLWE families. CoRR abs/1710.03316 (2017) - [i58]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search-RLWE problem with small errors. CoRR abs/1710.03739 (2017) - [i57]Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2017: 207 (2017) - [i56]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. IACR Cryptol. ePrint Arch. 2017: 598 (2017) - [i55]Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal:
Private Collaborative Neural Network Learning. IACR Cryptol. ePrint Arch. 2017: 762 (2017) - [i54]Christophe Petit, Kristin E. Lauter:
Hard and Easy Problems for Supersingular Isogeny Graphs. IACR Cryptol. ePrint Arch. 2017: 962 (2017) - [i53]Kristin E. Lauter, Michael Naehrig:
Cryptographic Pairings. IACR Cryptol. ePrint Arch. 2017: 1108 (2017) - 2016
- [j19]Shuang Wang, Yuchen Zhang, Wenrui Dai, Kristin E. Lauter, Miran Kim, Yuzhe Richard Tang, Hongkai Xiong, Xiaoqian Jiang:
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinform. 32(2): 211-218 (2016) - [j18]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Fast Cryptography in Genus 2. J. Cryptol. 29(1): 28-60 (2016) - [j17]Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:
Constructing genus-3 hyperelliptic Jacobians with CM. LMS J. Comput. Math. 19(A): 283-300 (2016) - [j16]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. Proc. Priv. Enhancing Technol. 2016(4): 335-355 (2016) - [c30]Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. ICML 2016: 201-210 - [c29]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security Considerations for Galois Non-dual RLWE Families. SAC 2016: 443-462 - [i52]Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin E. Lauter, Beth Malmskog, Joachim Rosenthal:
Variations of the McEliece Cryptosystem. CoRR abs/1612.05085 (2016) - [i51]Kristin E. Lauter, Radu Sion, Nigel P. Smart:
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051). Dagstuhl Reports 6(1): 207-223 (2016) - [i50]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Vulnerable Galois RLWE Families and Improved Attacks. IACR Cryptol. ePrint Arch. 2016: 193 (2016) - [i49]Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:
Constructing genus 3 hyperelliptic Jacobians with CM. IACR Cryptol. ePrint Arch. 2016: 328 (2016) - [i48]Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. IACR Cryptol. ePrint Arch. 2016: 620 (2016) - 2015
- [j15]Kim Laine, Kristin E. Lauter:
Time-memory trade-offs for index calculus in genus 3. J. Math. Cryptol. 9(2): 95-114 (2015) - [j14]Reinier Bröker, Everett W. Howe, Kristin E. Lauter, Peter Stevenhagen:
Genus-2 curves and Jacobians with a given number of points. LMS J. Comput. Math. 18(1): 170-197 (2015) - [j13]Miran Kim, Kristin E. Lauter:
Private genome analysis through homomorphic encryption. BMC Medical Informatics Decis. Mak. 15-S(5): S3 (2015) - [c28]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably Weak Instances of Ring-LWE. CRYPTO (1) 2015: 63-92 - [c27]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. Financial Cryptography Workshops 2015: 194-212 - [e3]Kristin E. Lauter, Francisco Rodríguez-Henríquez:
Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. Lecture Notes in Computer Science 9230, Springer 2015, ISBN 978-3-319-22173-1 [contents] - [i47]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. CoRR abs/1502.03708 (2015) - [i46]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. CoRR abs/1508.01375 (2015) - [i45]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. IACR Cryptol. ePrint Arch. 2015: 106 (2015) - [i44]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. IACR Cryptol. ePrint Arch. 2015: 132 (2015) - [i43]Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2015: 133 (2015) - [i42]Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. IACR Cryptol. ePrint Arch. 2015: 176 (2015) - [i41]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. IACR Cryptol. ePrint Arch. 2015: 386 (2015) - [i40]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. IACR Cryptol. ePrint Arch. 2015: 758 (2015) - [i39]Miran Kim, Kristin E. Lauter:
Private Genome Analysis through Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 965 (2015) - [i38]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on Search RLWE. IACR Cryptol. ePrint Arch. 2015: 971 (2015) - 2014
- [j12]Joppe W. Bos, Kristin E. Lauter, Michael Naehrig:
Private predictive analysis on encrypted medical data. J. Biomed. Informatics 50: 234-243 (2014) - [j11]Craig Costello, Alyson Deines-Schartz, Kristin E. Lauter, Tonghai Yang:
Constructing abelian surfaces for cryptography via Rosenhain invariants. LMS J. Comput. Math. 17(Theory): 157-180 (2014) - [j10]David Kohel, Kristin E. Lauter, Christophe Petit, Jean-Pierre Tignol:
On the quaternion -isogeny path problem. LMS J. Comput. Math. 17(Theory): 418-432 (2014) - [j9]Reinier Bröker, Kristin E. Lauter:
Evaluating Igusa functions. Math. Comput. 83(290): 2977-2999 (2014) - [c26]Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. LATINCRYPT 2014: 3-27 - [c25]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:
Weak Instances of PLWE. Selected Areas in Cryptography 2014: 183-194 - [e2]Tanja Lange, Kristin E. Lauter, Petr Lisonek:
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8282, Springer 2014, ISBN 978-3-662-43413-0 [contents] - [i37]Pengtao Xie, Misha Bilenko, Tom Finley, Ran Gilad-Bachrach, Kristin E. Lauter, Michael Naehrig:
Crypto-Nets: Neural Networks over Encrypted Data. CoRR abs/1412.6181 (2014) - [i36]Joppe W. Bos, Kristin E. Lauter, Michael Naehrig:
Private Predictive Analysis on Encrypted Medical Data. IACR Cryptol. ePrint Arch. 2014: 336 (2014) - [i35]Kim Laine, Kristin E. Lauter:
Time-Memory Trade-offs for Index Calculus in Genus 3. IACR Cryptol. ePrint Arch. 2014: 346 (2014) - [i34]Craig Costello, Alyson Deines-Schartz, Kristin E. Lauter, Tonghai Yang:
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants. IACR Cryptol. ePrint Arch. 2014: 424 (2014) - [i33]David Kohel, Kristin E. Lauter, Christophe Petit, Jean-Pierre Tignol:
On the quaternion ℓ-isogeny path problem. IACR Cryptol. ePrint Arch. 2014: 505 (2014) - [i32]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:
Weak Instances of PLWE. IACR Cryptol. ePrint Arch. 2014: 784 (2014) - 2013
- [j8]Kristin E. Lauter, Ning Shang:
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. Des. Codes Cryptogr. 67(3): 341-355 (2013) - [c24]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition. CHES 2013: 331-348 - [c23]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Fast Cryptography in Genus 2. EUROCRYPT 2013: 194-210 - [c22]Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. IMACC 2013: 45-64 - [i31]Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2013: 75 (2013) - [i30]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition. IACR Cryptol. ePrint Arch. 2013: 146 (2013) - 2012
- [j7]Reinier Bröker, Kristin E. Lauter, Andrew V. Sutherland:
Modular polynomials via isogeny volcanoes. Math. Comput. 81(278): 1201-1231 (2012) - [c21]Kristin E. Lauter:
Practical applications of homomorphic encryption. CCSW 2012: 57-58 - [c20]Thore Graepel, Kristin E. Lauter, Michael Naehrig:
ML Confidential: Machine Learning on Encrypted Data. ICISC 2012: 1-21 - [c19]