default search action
Kristin E. Lauter
Person information
- affiliation: Microsoft Research, Redmond
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]François Charton, Kristin E. Lauter, Cathy Yuanchen Li, Mark Tygert:
An Efficient Algorithm for Integer Lattice Reduction. SIAM J. Matrix Anal. Appl. 45(1): 353-367 (2024) - [c41]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The Cool and the Cruel: Separating Hard Parts of LWE Secrets. AFRICACRYPT 2024: 428-453 - [i101]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. CoRR abs/2402.01082 (2024) - [i100]Kristin E. Lauter, Cathy Yuanchen Li, Krystal Maughan, Rachel Newton, Megha Srivastava:
Machine learning for modular multiplication. CoRR abs/2402.19254 (2024) - [i99]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. CoRR abs/2403.10328 (2024) - [i98]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. CoRR abs/2408.00882 (2024) - [i97]Eshika Saxena, Alberto Alfarano, Emily Wenger, Kristin E. Lauter:
Teaching Transformers Modular Arithmetic at Scale. CoRR abs/2410.03569 (2024) - [i96]Samuel Stevens, Emily Wenger, Cathy Yuanchen Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin E. Lauter:
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors. IACR Cryptol. ePrint Arch. 2024: 150 (2024) - [i95]Niklas Nolte, Mohamed Malhou, Emily Wenger, Samuel Stevens, Cathy Yuanchen Li, François Charton, Kristin E. Lauter:
The cool and the cruel: separating hard parts of LWE secrets. IACR Cryptol. ePrint Arch. 2024: 443 (2024) - [i94]Emily Wenger, Eshika Saxena, Mohamed Malhou, Ellie Thieu, Kristin E. Lauter:
Benchmarking Attacks on Learning with Errors. IACR Cryptol. ePrint Arch. 2024: 1229 (2024) - 2023
- [j32]Sarah Arpin, Catalina Camacho-Navarro, Kristin E. Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková:
Adventures in Supersingularland. Exp. Math. 32(2): 241-268 (2023) - [j31]Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Adam Paetznick, Christophe Petit:
Shorter quantum circuits via single-qubit gate approximation. Quantum 7: 1208 (2023) - [c40]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets. CCS 2023: 2606-2620 - [c39]Cathy Yuanchen Li, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on LWE with sparse small secrets. NeurIPS 2023 - [i93]François Charton, Kristin E. Lauter, Cathy Yuanchen Li, Mark Tygert:
An efficient algorithm for integer lattice reduction. CoRR abs/2303.02226 (2023) - [i92]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. CoRR abs/2303.04178 (2023) - [i91]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets. CoRR abs/2306.11641 (2023) - [i90]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Mohamed Malhou, Evrard Garcelon, François Charton, Kristin E. Lauter:
SALSA PICANTE: a machine learning attack on LWE with binary secrets. IACR Cryptol. ePrint Arch. 2023: 340 (2023) - [i89]Cathy Yuanchen Li, Jana Sotáková, Emily Wenger, Zeyuan Allen-Zhu, François Charton, Kristin E. Lauter:
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets. IACR Cryptol. ePrint Arch. 2023: 968 (2023) - 2022
- [j30]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. ACM Comput. Surv. 54(9): 195:1-195:37 (2022) - [c38]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. NeurIPS 2022 - [i88]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. CoRR abs/2201.11079 (2022) - [i87]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. CoRR abs/2205.03976 (2022) - [i86]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. CoRR abs/2207.04785 (2022) - [i85]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. IACR Cryptol. ePrint Arch. 2022: 98 (2022) - [i84]Vadym Kliuchnikov, Kristin E. Lauter, Romy M. Minko, Christophe Petit, Adam Paetznick:
Shorter quantum circuits. IACR Cryptol. ePrint Arch. 2022: 372 (2022) - [i83]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. IACR Cryptol. ePrint Arch. 2022: 562 (2022) - [i82]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. IACR Cryptol. ePrint Arch. 2022: 935 (2022) - 2021
- [j29]Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:
Editor's Preface for the Second Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 15(1): 1-3 (2021) - [i81]Miran Kim, Xiaoqian Jiang, Kristin E. Lauter, Elkhan Ismayilzada, Shayan Shams:
HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data. CoRR abs/2104.09164 (2021) - [i80]Elena Fuchs, Kristin E. Lauter, Matthew Litman, Austin Tran:
A Cryptographic Hash Function from Markoff Triples. CoRR abs/2107.10906 (2021) - [i79]Kristin E. Lauter:
Private AI: Machine Learning on Encrypted Data. IACR Cryptol. ePrint Arch. 2021: 324 (2021) - [i78]Laia Amorós, Annamaria Iezzi, Kristin E. Lauter, Chloe Martindale, Jana Sotáková:
Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees. IACR Cryptol. ePrint Arch. 2021: 372 (2021) - [i77]Elena Fuchs, Kristin E. Lauter, Matthew Litman, Austin Tran:
A Cryptographic Hash Function from Markoff Triples. IACR Cryptol. ePrint Arch. 2021: 983 (2021) - 2020
- [j28]Jung Hee Cheon, Kristin E. Lauter, Donggeon Yhee:
Preface to the First Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 14(1): 1-4 (2020) - [j27]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. J. Math. Cryptol. 14(1): 5-14 (2020) - [i76]Mingliang Chen, Aria Shahverdi, Sarah Anderson, Se Yong Park, Justin Zhang, Dana Dachman-Soled, Kristin E. Lauter, Min Wu:
Transparency Tools for Fairness in AI (Luskin). CoRR abs/2007.04484 (2020) - [i75]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. CoRR abs/2007.09270 (2020) - [i74]Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. IACR Cryptol. ePrint Arch. 2020: 539 (2020)
2010 – 2019
- 2019
- [c37]Kristin E. Lauter, Christophe Petit:
Supersingular isogeny graphs in cryptography. BCC 2019: 143-166 - [c36]Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. CCSW 2019: 117-128 - [c35]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. PLDI 2019: 142-156 - [c34]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. USENIX Security Symposium 2019: 1501-1518 - [i73]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. CoRR abs/1902.07342 (2019) - [i72]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - [i71]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 171 (2019) - [i70]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i69]Sarah Arpin, Catalina Camacho-Navarro, Kristin E. Lauter, Joelle Lim, Kristina Nelson, Travis Scholl, Jana Sotáková:
Adventures in Supersingularland. IACR Cryptol. ePrint Arch. 2019: 1056 (2019) - 2018
- [j26]Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography, Part 2. IEEE Secur. Priv. 16(5): 12-13 (2018) - [j25]Bita Darvish Rouhani, Siam Umar Hussain, Kristin E. Lauter, Farinaz Koushanfar:
ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs. ACM Trans. Reconfigurable Technol. Syst. 11(3): 21:1-21:21 (2018) - [c33]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. CCS 2018: 1209-1222 - [c32]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions. EUROCRYPT (3) 2018: 329-368 - [i68]Anamaria Costache, Brooke Feigon, Kristin E. Lauter, Maike Massierer, Anna Puskás:
Ramanujan graphs in cryptography. CoRR abs/1806.05709 (2018) - [i67]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. CoRR abs/1807.03038 (2018) - [i66]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs. CoRR abs/1810.00845 (2018) - [i65]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter, Travis Morrison, Christophe Petit:
Supersingular isogeny graphs and endomorphism rings: reductions and solutions. IACR Cryptol. ePrint Arch. 2018: 371 (2018) - [i64]Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin E. Lauter:
Logistic regression over encrypted data from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2018: 462 (2018) - [i63]Anamaria Costache, Brooke Feigon, Kristin E. Lauter, Maike Massierer, Anna Puskás:
Ramanujan graphs in cryptography. IACR Cryptol. ePrint Arch. 2018: 593 (2018) - [i62]Dan Boneh, Darren B. Glass, Daniel Krashen, Kristin E. Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry:
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves. IACR Cryptol. ePrint Arch. 2018: 665 (2018) - [i61]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. IACR Cryptol. ePrint Arch. 2018: 1041 (2018) - 2017
- [j24]Feng Chen, Shuang Wang, Xiaoqian Jiang, Sijie Ding, Yao Lu, Jihoon Kim, Süleyman Cenk Sahinalp, Chisato Shimizu, Jane C. Burns, Victoria J. Wright, Eileen Png, Martin L. Hibberd, David D. Lloyd, Hai Yang, Amalio Telenti, Cinnamon S. Bloss, Dov Fox, Kristin E. Lauter, Lucila Ohno-Machado:
PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS. Bioinform. 33(6): 871-878 (2017) - [j23]Johannes Buchmann, Kristin E. Lauter, Michele Mosca:
Postquantum Cryptography - State of the Art. IEEE Secur. Priv. 15(4): 12-13 (2017) - [j22]Kristin E. Lauter:
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs. IEEE Secur. Priv. 15(4): 22-27 (2017) - [j21]Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
Manual for Using Homomorphic Encryption for Bioinformatics. Proc. IEEE 105(3): 552-567 (2017) - [j20]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search RLWE Problem with Small Errors. SIAM J. Appl. Algebra Geom. 1(1): 665-682 (2017) - [c31]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. ASIACRYPT (2) 2017: 241-270 - [i60]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum resource estimates for computing elliptic curve discrete logarithms. CoRR abs/1706.06752 (2017) - [i59]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security considerations for Galois non-dual RLWE families. CoRR abs/1710.03316 (2017) - [i58]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on the Search-RLWE problem with small errors. CoRR abs/1710.03739 (2017) - [i57]Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2017: 207 (2017) - [i56]Martin Roetteler, Michael Naehrig, Krysta M. Svore, Kristin E. Lauter:
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms. IACR Cryptol. ePrint Arch. 2017: 598 (2017) - [i55]Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal:
Private Collaborative Neural Network Learning. IACR Cryptol. ePrint Arch. 2017: 762 (2017) - [i54]Christophe Petit, Kristin E. Lauter:
Hard and Easy Problems for Supersingular Isogeny Graphs. IACR Cryptol. ePrint Arch. 2017: 962 (2017) - [i53]Kristin E. Lauter, Michael Naehrig:
Cryptographic Pairings. IACR Cryptol. ePrint Arch. 2017: 1108 (2017) - 2016
- [j19]Shuang Wang, Yuchen Zhang, Wenrui Dai, Kristin E. Lauter, Miran Kim, Yuzhe Richard Tang, Hongkai Xiong, Xiaoqian Jiang:
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinform. 32(2): 211-218 (2016) - [j18]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Fast Cryptography in Genus 2. J. Cryptol. 29(1): 28-60 (2016) - [j17]Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:
Constructing genus-3 hyperelliptic Jacobians with CM. LMS J. Comput. Math. 19(A): 283-300 (2016) - [j16]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. Proc. Priv. Enhancing Technol. 2016(4): 335-355 (2016) - [c30]Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. ICML 2016: 201-210 - [c29]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Security Considerations for Galois Non-dual RLWE Families. SAC 2016: 443-462 - [i52]Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin E. Lauter, Beth Malmskog, Joachim Rosenthal:
Variations of the McEliece Cryptosystem. CoRR abs/1612.05085 (2016) - [i51]Kristin E. Lauter, Radu Sion, Nigel P. Smart:
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051). Dagstuhl Reports 6(1): 207-223 (2016) - [i50]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Vulnerable Galois RLWE Families and Improved Attacks. IACR Cryptol. ePrint Arch. 2016: 193 (2016) - [i49]Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:
Constructing genus 3 hyperelliptic Jacobians with CM. IACR Cryptol. ePrint Arch. 2016: 328 (2016) - [i48]Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. IACR Cryptol. ePrint Arch. 2016: 620 (2016) - 2015
- [j15]Kim Laine, Kristin E. Lauter:
Time-memory trade-offs for index calculus in genus 3. J. Math. Cryptol. 9(2): 95-114 (2015) - [j14]Reinier Bröker, Everett W. Howe, Kristin E. Lauter, Peter Stevenhagen:
Genus-2 curves and Jacobians with a given number of points. LMS J. Comput. Math. 18(1): 170-197 (2015) - [j13]Miran Kim, Kristin E. Lauter:
Private genome analysis through homomorphic encryption. BMC Medical Informatics Decis. Mak. 15-S(5): S3 (2015) - [c28]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably Weak Instances of Ring-LWE. CRYPTO (1) 2015: 63-92 - [c27]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. Financial Cryptography Workshops 2015: 194-212 - [e3]Kristin E. Lauter, Francisco Rodríguez-Henríquez:
Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings. Lecture Notes in Computer Science 9230, Springer 2015, ISBN 978-3-319-22173-1 [contents] - [i47]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. CoRR abs/1502.03708 (2015) - [i46]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. CoRR abs/1508.01375 (2015) - [i45]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Provably weak instances of Ring-LWE. IACR Cryptol. ePrint Arch. 2015: 106 (2015) - [i44]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. IACR Cryptol. ePrint Arch. 2015: 132 (2015) - [i43]Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2015: 133 (2015) - [i42]Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. IACR Cryptol. ePrint Arch. 2015: 176 (2015) - [i41]David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:
Privately Evaluating Decision Trees and Random Forests. IACR Cryptol. ePrint Arch. 2015: 386 (2015) - [i40]Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:
Ring-LWE Cryptography for the Number Theorist. IACR Cryptol. ePrint Arch. 2015: 758 (2015) - [i39]Miran Kim, Kristin E. Lauter:
Private Genome Analysis through Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 965 (2015) - [i38]Hao Chen, Kristin E. Lauter, Katherine E. Stange:
Attacks on Search RLWE. IACR Cryptol. ePrint Arch. 2015: 971 (2015) - 2014
- [j12]Joppe W. Bos, Kristin E. Lauter, Michael Naehrig:
Private predictive analysis on encrypted medical data. J. Biomed. Informatics 50: 234-243 (2014) - [j11]Craig Costello, Alyson Deines-Schartz, Kristin E. Lauter, Tonghai Yang:
Constructing abelian surfaces for cryptography via Rosenhain invariants. LMS J. Comput. Math. 17(Theory): 157-180 (2014) - [j10]David Kohel, Kristin E. Lauter, Christophe Petit, Jean-Pierre Tignol:
On the quaternion -isogeny path problem. LMS J. Comput. Math. 17(Theory): 418-432 (2014) - [j9]Reinier Bröker, Kristin E. Lauter:
Evaluating Igusa functions. Math. Comput. 83(290): 2977-2999 (2014) - [c26]Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:
Private Computation on Encrypted Genomic Data. LATINCRYPT 2014: 3-27 - [c25]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:
Weak Instances of PLWE. Selected Areas in Cryptography 2014: 183-194 - [e2]Tanja Lange, Kristin E. Lauter, Petr Lisonek:
Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8282, Springer 2014, ISBN 978-3-662-43413-0 [contents] - [i37]Pengtao Xie, Misha Bilenko, Tom Finley, Ran Gilad-Bachrach, Kristin E. Lauter, Michael Naehrig:
Crypto-Nets: Neural Networks over Encrypted Data. CoRR abs/1412.6181 (2014) - [i36]Joppe W. Bos, Kristin E. Lauter, Michael Naehrig:
Private Predictive Analysis on Encrypted Medical Data. IACR Cryptol. ePrint Arch. 2014: 336 (2014) - [i35]Kim Laine, Kristin E. Lauter:
Time-Memory Trade-offs for Index Calculus in Genus 3. IACR Cryptol. ePrint Arch. 2014: 346 (2014) - [i34]Craig Costello, Alyson Deines-Schartz, Kristin E. Lauter, Tonghai Yang:
Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants. IACR Cryptol. ePrint Arch. 2014: 424 (2014) - [i33]David Kohel, Kristin E. Lauter, Christophe Petit, Jean-Pierre Tignol:
On the quaternion ℓ-isogeny path problem. IACR Cryptol. ePrint Arch. 2014: 505 (2014) - [i32]Kirsten Eisenträger, Sean Hallgren, Kristin E. Lauter:
Weak Instances of PLWE. IACR Cryptol. ePrint Arch. 2014: 784 (2014) - 2013
- [j8]Kristin E. Lauter, Ning Shang:
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. Des. Codes Cryptogr. 67(3): 341-355 (2013) - [c24]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition. CHES 2013: 331-348 - [c23]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Fast Cryptography in Genus 2. EUROCRYPT 2013: 194-210 - [c22]Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. IMACC 2013: 45-64 - [i31]Joppe W. Bos, Kristin E. Lauter, Jake Loftus, Michael Naehrig:
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2013: 75 (2013) - [i30]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition. IACR Cryptol. ePrint Arch. 2013: 146 (2013) - 2012
- [j7]Reinier Bröker, Kristin E. Lauter, Andrew V. Sutherland:
Modular polynomials via isogeny volcanoes. Math. Comput. 81(278): 1201-1231 (2012) - [c21]Kristin E. Lauter:
Practical applications of homomorphic encryption. CCSW 2012: 57-58 - [c20]Thore Graepel, Kristin E. Lauter, Michael Naehrig:
ML Confidential: Machine Learning on Encrypted Data. ICISC 2012: 1-21 - [c19]Tolga Acar, Kristin E. Lauter, Michael Naehrig, Daniel Shumow:
Affine Pairings on ARM. Pairing 2012: 203-209 - [i29]Thore Graepel, Kristin E. Lauter, Michael Naehrig:
ML Confidential: Machine Learning on Encrypted Data. IACR Cryptol. ePrint Arch. 2012: 323 (2012) - [i28]Kristin E. Lauter, Damien Robert:
Improved CRT Algorithm for Class Polynomials in Genus 2. IACR Cryptol. ePrint Arch. 2012: 443 (2012) - [i27]Kristin E. Lauter, Bianca Viray:
An arithmetic intersection formula for denominators of Igusa class polynomials. IACR Cryptol. ePrint Arch. 2012: 614 (2012) - [i26]Joppe W. Bos, Craig Costello, Hüseyin Hisil, Kristin E. Lauter:
Two is Greater than One. IACR Cryptol. ePrint Arch. 2012: 670 (2012) - 2011
- [c18]Michael Naehrig, Kristin E. Lauter, Vinod Vaikuntanathan:
Can homomorphic encryption be practical? CCSW 2011: 113-124 - [c17]Craig Costello, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. INDOCRYPT 2011: 320-342 - [c16]Craig Costello, Kristin E. Lauter:
Group Law Computations on Jacobians of Hyperelliptic Curves. Selected Areas in Cryptography 2011: 92-117 - [p1]Helen G. Grundman, Jennifer Johnson-Leung, Kristin E. Lauter, Adriana Salerno, Bianca Viray, Erika Wittenborn:
Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory. WIN - Women in Numbers 2011: 35-60 - [e1]Alina-Carmen Cojocaru, Kristin E. Lauter, Rachel Pries, Renate Scheidler:
WIN - Women in Numbers - Research Directions in Number Theory. Fields Institute Communications 60, American Mathematical Society 2011, ISBN 978-0-8218-5226-2 [contents] - [i25]Melissa Chase, Kristin E. Lauter:
An Anonymous Health Care System. IACR Cryptol. ePrint Arch. 2011: 16 (2011) - [i24]Tolga Acar, Kristin E. Lauter, Michael Naehrig, Daniel Shumow:
Affine Pairings on ARM. IACR Cryptol. ePrint Arch. 2011: 243 (2011) - [i23]Craig Costello, Kristin E. Lauter:
Group Law Computations on Jacobians of Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2011: 306 (2011) - [i22]Kristin E. Lauter, Michael Naehrig, Vinod Vaikuntanathan:
Can Homomorphic Encryption be Practical? IACR Cryptol. ePrint Arch. 2011: 405 (2011) - [i21]Craig Costello, Kristin E. Lauter, Michael Naehrig:
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. IACR Cryptol. ePrint Arch. 2011: 465 (2011) - [i20]Eyal Z. Goren, Kristin E. Lauter:
A Gross-Zagier formula for quaternion algebras over totally real fields. IACR Cryptol. ePrint Arch. 2011: 666 (2011) - 2010
- [c15]Seny Kamara, Kristin E. Lauter:
Cryptographic Cloud Storage. Financial Cryptography Workshops 2010: 136-149 - [c14]Kristin E. Lauter, Peter L. Montgomery, Michael Naehrig:
An Analysis of Affine Coordinates for Pairing Computation. Pairing 2010: 1-20 - [c13]Melissa Chase, Kristin E. Lauter:
An Anonymous Health Care System. HealthSec 2010 - [i19]Eyal Z. Goren, Kristin E. Lauter:
Genus 2 Curves with Complex Multiplication. IACR Cryptol. ePrint Arch. 2010: 156 (2010) - [i18]Kristin E. Lauter, Tonghai Yang:
Computing genus 2 curves from invariants on the Hilbert moduli space. IACR Cryptol. ePrint Arch. 2010: 294 (2010) - [i17]Kristin E. Lauter, Peter L. Montgomery, Michael Naehrig:
An Analysis of Affine Coordinates for Pairing Computation. IACR Cryptol. ePrint Arch. 2010: 363 (2010) - [i16]Kristin E. Lauter, Ning Shang:
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields. IACR Cryptol. ePrint Arch. 2010: 529 (2010)
2000 – 2009
- 2009
- [j6]Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for network coding. Int. J. Inf. Coding Theory 1(1): 3-14 (2009) - [j5]Denis Xavier Charles, Kristin E. Lauter, Eyal Z. Goren:
Cryptographic Hash Functions from Expander Graphs. J. Cryptol. 22(1): 93-113 (2009) - [j4]Reinier Bröker, Kristin E. Lauter:
Modular Polynomials for Genus 2. LMS J. Comput. Math. 12: 326-339 (2009) - [c12]Josh Benaloh, Melissa Chase, Eric Horvitz, Kristin E. Lauter:
Patient controlled encryption: ensuring privacy of electronic medical records. CCSW 2009: 103-114 - 2008
- [c11]Juliana Belding, Reinier Bröker, Andreas Enge, Kristin E. Lauter:
Computing Hilbert Class Polynomials. ANTS 2008: 282-295 - [c10]Reinier Bröker, Denis Xavier Charles, Kristin E. Lauter:
Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography. Pairing 2008: 100-112 - [c9]Kirsten Eisenträger, Dimitar Jetchev, Kristin E. Lauter:
Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group. Pairing 2008: 113-125 - [c8]Kristin E. Lauter, Katherine E. Stange:
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences. Selected Areas in Cryptography 2008: 309-327 - [c7]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Functions. SCN 2008: 263-277 - [i15]Juliana Belding, Reinier Bröker, Andreas Enge, Kristin E. Lauter:
Computing Hilbert Class Polynomials. IACR Cryptol. ePrint Arch. 2008: 62 (2008) - [i14]Kristin E. Lauter, Katherine E. Stange:
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences. IACR Cryptol. ePrint Arch. 2008: 99 (2008) - [i13]Reinier Bröker, Kristin E. Lauter:
Modular polynomials for genus 2. IACR Cryptol. ePrint Arch. 2008: 161 (2008) - [i12]Christophe Petit, Kristin E. Lauter, Jean-Jacques Quisquater:
Full Cryptanalysis of LPS and Morgenstern Hash Function. IACR Cryptol. ePrint Arch. 2008: 173 (2008) - [i11]Larry Zhu, Karthik Jaganathan, Kristin E. Lauter:
Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT). RFC 5349: 1-10 (2008) - 2007
- [c6]Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. ProvSec 2007: 1-16 - [i10]David Freeman, Kristin E. Lauter:
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields. IACR Cryptol. ePrint Arch. 2007: 10 (2007) - 2006
- [j3]Mathieu Ciet, Marc Joye, Kristin E. Lauter, Peter L. Montgomery:
Trading Inversions for Multiplications in Elliptic Curve Cryptography. Des. Codes Cryptogr. 39(2): 189-206 (2006) - [c5]Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for Network Coding. CISS 2006: 857-863 - [c4]Kristin E. Lauter, Anton Mityagin:
Security Analysis of KEA Authenticated Key Exchange Protocol. Public Key Cryptography 2006: 378-394 - [i9]Denis Xavier Charles, Eyal Z. Goren, Kristin E. Lauter:
Cryptographic hash functions from expander graphs. IACR Cryptol. ePrint Arch. 2006: 21 (2006) - [i8]Denis Xavier Charles, Kamal Jain, Kristin E. Lauter:
Signatures for Network Coding. IACR Cryptol. ePrint Arch. 2006: 25 (2006) - [i7]Brian A. LaMacchia, Kristin E. Lauter, Anton Mityagin:
Stronger Security of Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2006: 73 (2006) - 2005
- [j2]Denis Xavier Charles, Kristin E. Lauter:
Computing Modular Polynomials. LMS J. Comput. Math. 8: 195-204 (2005) - [i6]Kristin E. Lauter, Anton Mityagin:
Security Analysis of KEA Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2005: 265 (2005) - 2004
- [j1]Kristin E. Lauter:
The advantages of elliptic curve cryptography for wireless security. IEEE Wirel. Commun. 11(1): 62-67 (2004) - [c3]Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:
Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves. ANTS 2004: 169-183 - [i5]Denis Xavier Charles, Kristin E. Lauter:
Computing Modular Polynomials. IACR Cryptol. ePrint Arch. 2004: 189 (2004) - 2003
- [c2]Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. CT-RSA 2003: 343-354 - [i4]Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:
Improved Weil and Tate pairings for elliptic and hyperelliptic curves. IACR Cryptol. ePrint Arch. 2003: 242 (2003) - [i3]Mathieu Ciet, Marc Joye, Kristin E. Lauter, Peter L. Montgomery:
Trading Inversions for Multiplications in Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2003: 257 (2003) - 2002
- [i2]Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery:
An Efficient Procedure to Double and Add Points on an Elliptic Curve. IACR Cryptol. ePrint Arch. 2002: 112 (2002) - 2001
- [i1]Amod Agashe, Kristin E. Lauter, Ramarathnam Venkatesan:
Constructing elliptic curves with a given number of points over a finite field. IACR Cryptol. ePrint Arch. 2001: 96 (2001)
1990 – 1999
- 1996
- [c1]Kristin E. Lauter:
Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points. ANTS 1996: 187-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint