Kristin E. Lauter
Orcid: 0000-0002-1320-696XAffiliations:
- Microsoft Research, Redmond
According to our database1,
Kristin E. Lauter
authored at least 120 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2025
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors.
Trans. Mach. Learn. Res., 2025
IACR Cryptol. ePrint Arch., 2025
Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
SIAM J. Matrix Anal. Appl., March, 2024
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024
2023
Quantum, December, 2023
IACR Cryptol. ePrint Arch., 2023
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.
ACM Comput. Surv., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
2021
J. Math. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data.
CoRR, 2021
2020
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey.
CoRR, 2020
2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Proceedings of the Surveys in Combinatorics, 2019: Invited lectures from the 27th British Combinatorial Conference, Birmingham, UK, July 29, 2019
2018
ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
SIAM J. Appl. Algebra Geom., 2017
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.
Bioinform., 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS.
Bioinform., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016
2015
BMC Medical Informatics Decis. Mak., December, 2015
LMS J. Comput. Math., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
LMS J. Comput. Math., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory.
Proceedings of the WIN - Women in Numbers - Research Directions in Number Theory., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT).
RFC, September, 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Provable Security, 2007
2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006
2005
2004
IEEE Wirel. Commun., 2004
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Topics in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
2001
IACR Cryptol. ePrint Arch., 2001
1996
Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points.
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996