Kim Laine

Orcid: 0000-0002-9087-5913

According to our database1, Kim Laine authored at least 44 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ARMS: A Vision for Actor Reputation Metric Systems in the Open-Source Software Supply Chain.
CoRR, May, 2025

Handling Identity and Fraud in the Metaverse.
IEEE Secur. Priv., 2025

Sandi: A System for Accountability.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
Sandi: A System for Accountability and Applications in Direct Communication.
CoRR, 2024

OPTIKS: An Optimized Key Transparency System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Precio: Private Aggregate Measurement via Oblivious Shuffling.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Sandi: A System for Accountability and Applications in Direct Communication (Extended Abstract).
CoRR, 2023

Does Prompt-Tuning Language Model Ensure Privacy?
CoRR, 2023

UN Handbook on Privacy-Preserving Computation Techniques.
CoRR, 2023

Understanding People's Concerns and Attitudes Toward Smart Cities.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery.
IACR Cryptol. ePrint Arch., 2022

Planting and Mitigating Memorized Content in Predictive-Text Language Models.
CoRR, 2022

2021
Aggregate Measurement via Oblivious Shuffling.
IACR Cryptol. ePrint Arch., 2021

When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

EVA Improved: Compiler and Extension Library for CKKS.
Proceedings of the WAHC '21: Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2021

2020
Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

PrivFT: Private and Fast Text Classification With Homomorphic Encryption.
IEEE Access, 2020

EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE.
Proceedings of the Computer Security - ESORICS 2020, 2020

HEAX: An Architecture for Computing on Encrypted Data.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud.
IACR Cryptol. ePrint Arch., 2019

Homomorphic noise growth in practice: comparing BGV and FV.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

PrivFT: Private and Fast Text Classification with Homomorphic Encryption.
CoRR, 2019

XONN: XNOR-based Oblivious Deep Neural Network Inference.
Proceedings of the 28th USENIX Security Symposium, 2019

CHET: an optimizing compiler for fully-homomorphic neural-network inferencing.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Secure Data Exchange: A Marketplace in the Cloud.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Logistic regression over encrypted data from fully homomorphic encryption.
IACR Cryptol. ePrint Arch., 2018

CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs.
CoRR, 2018

PIR with Compressed Queries and Amortized Query Processing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

High-Precision Arithmetic in Homomorphic Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Labeled PSI from Fully Homomorphic Encryption with Malicious Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Manual for Using Homomorphic Encryption for Bioinformatics.
Proc. IEEE, 2017

Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Private Queries on Encrypted Genomic Data.
IACR Cryptol. ePrint Arch., 2017

Simple Encrypted Arithmetic Library - SEAL v2.1.
Proceedings of the Financial Cryptography and Data Security, 2017

Fast Private Set Intersection from Homomorphic Encryption.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016

2015
Key Recovery for LWE in Polynomial Time.
IACR Cryptol. ePrint Arch., 2015

2014
Time-Memory Trade-offs for Index Calculus in Genus 3.
IACR Cryptol. ePrint Arch., 2014


  Loading...