Kim Laine

Orcid: 0000-0002-9087-5913

According to our database1, Kim Laine authored at least 40 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Sandi: A System for Accountability and Applications in Direct Communication.
CoRR, 2024

2023
OPTIKS: An Optimized Key Transparency System.
IACR Cryptol. ePrint Arch., 2023

Sandi: A System for Accountability and Applications in Direct Communication (Extended Abstract).
CoRR, 2023

Does Prompt-Tuning Language Model Ensure Privacy?
CoRR, 2023

UN Handbook on Privacy-Preserving Computation Techniques.
CoRR, 2023

Understanding People's Concerns and Attitudes Toward Smart Cities.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery.
IACR Cryptol. ePrint Arch., 2022

Planting and Mitigating Memorized Content in Predictive-Text Language Models.
CoRR, 2022

2021
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication.
IACR Cryptol. ePrint Arch., 2021

EVA Improved: Compiler and Extension Library for CKKS.
IACR Cryptol. ePrint Arch., 2021

Aggregate Measurement via Oblivious Shuffling.
IACR Cryptol. ePrint Arch., 2021

Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead.
IACR Cryptol. ePrint Arch., 2020

Trustworthy AI Inference Systems: An Industry Research View.
CoRR, 2020

PrivFT: Private and Fast Text Classification With Homomorphic Encryption.
IEEE Access, 2020

EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE.
Proceedings of the Computer Security - ESORICS 2020, 2020

HEAX: An Architecture for Computing on Encrypted Data.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

2019
XONN: XNOR-based Oblivious Deep Neural Network Inference.
IACR Cryptol. ePrint Arch., 2019

HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud.
IACR Cryptol. ePrint Arch., 2019

Homomorphic noise growth in practice: comparing BGV and FV.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

PrivFT: Private and Fast Text Classification with Homomorphic Encryption.
CoRR, 2019

CHET: an optimizing compiler for fully-homomorphic neural-network inferencing.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

2018
Labeled PSI from Fully Homomorphic Encryption with Malicious Security.
IACR Cryptol. ePrint Arch., 2018

Logistic regression over encrypted data from fully homomorphic encryption.
IACR Cryptol. ePrint Arch., 2018

CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs.
CoRR, 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Manual for Using Homomorphic Encryption for Bioinformatics.
Proc. IEEE, 2017

Fast Private Set Intersection from Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

High-Precision Arithmetic in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Simple Encrypted Arithmetic Library - SEAL v2.1.
IACR Cryptol. ePrint Arch., 2017

Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Private Queries on Encrypted Genomic Data.
IACR Cryptol. ePrint Arch., 2017

PIR with compressed queries and amortized query processing.
IACR Cryptol. ePrint Arch., 2017

2016
Secure Data Exchange: A Marketplace in the Cloud.
IACR Cryptol. ePrint Arch., 2016

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016

2015
Key Recovery for LWE in Polynomial Time.
IACR Cryptol. ePrint Arch., 2015

2014
Time-Memory Trade-offs for Index Calculus in Genus 3.
IACR Cryptol. ePrint Arch., 2014


  Loading...