Kristin E. Lauter

Orcid: 0000-0002-1320-696X

Affiliations:
  • Microsoft Research, Redmond


According to our database1, Kristin E. Lauter authored at least 120 papers between 1996 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors.
Trans. Mach. Learn. Res., 2025

TAPAS: Datasets for Learning the Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2025

Making Hard Problems Easier with Custom Data Distributions and Loss Regularization: A Case Study in Modular Arithmetic.
IACR Cryptol. ePrint Arch., 2025

AI for Code-based Cryptography.
IACR Cryptol. ePrint Arch., 2025

Benchmarking Attacks on Learning with Errors.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
An Efficient Algorithm for Integer Lattice Reduction.
SIAM J. Matrix Anal. Appl., March, 2024

Teaching Transformers Modular Arithmetic at Scale.
CoRR, 2024

Machine learning for modular multiplication.
CoRR, 2024

The Cool and the Cruel: Separating Hard Parts of LWE Secrets.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024

2023
Shorter quantum circuits via single-qubit gate approximation.
Quantum, December, 2023

SALSA PICANTE: a machine learning attack on LWE with binary secrets.
IACR Cryptol. ePrint Arch., 2023

SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets.
IACR Cryptol. ePrint Arch., 2023

SALSA VERDE: a machine learning attack on LWE with sparse small secrets.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Shorter quantum circuits.
IACR Cryptol. ePrint Arch., 2022

Orientations and cycles in supersingular isogeny graphs.
IACR Cryptol. ePrint Arch., 2022

Orienteering with one endomorphism.
IACR Cryptol. ePrint Arch., 2022

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.
ACM Comput. Surv., 2022

SALSA: Attacking Lattice Cryptography with Transformers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Editor's Preface for the Second Annual MathCrypt Proceedings Volume.
J. Math. Cryptol., 2021

Private AI: Machine Learning on Encrypted Data.
IACR Cryptol. ePrint Arch., 2021

A Cryptographic Hash Function from Markoff Triples.
IACR Cryptol. ePrint Arch., 2021

Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees.
IACR Cryptol. ePrint Arch., 2021

HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data.
CoRR, 2021

2020
Preface to the First Annual MathCrypt Proceedings Volume.
J. Math. Cryptol., 2020

On the Concrete Security of LWE with Small Secret.
IACR Cryptol. ePrint Arch., 2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey.
CoRR, 2020

Transparency Tools for Fairness in AI (Luskin).
CoRR, 2020

2019
Adventures in Supersingularland.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019

XONN: XNOR-based Oblivious Deep Neural Network Inference.
Proceedings of the 28th USENIX Security Symposium, 2019

CHET: an optimizing compiler for fully-homomorphic neural-network inferencing.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

Secure Data Exchange: A Marketplace in the Cloud.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Supersingular isogeny graphs in cryptography.
Proceedings of the Surveys in Combinatorics, 2019: Invited lectures from the 27th British Combinatorial Conference, Birmingham, UK, July 29, 2019

2018
ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2018

Postquantum Cryptography, Part 2.
IEEE Secur. Priv., 2018

Ramanujan graphs in cryptography.
IACR Cryptol. ePrint Arch., 2018

Logistic regression over encrypted data from fully homomorphic encryption.
IACR Cryptol. ePrint Arch., 2018

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2018

CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs.
CoRR, 2018

Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Secure Outsourced Matrix Computation and Application to Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Attacks on the Search RLWE Problem with Small Errors.
SIAM J. Appl. Algebra Geom., 2017

Manual for Using Homomorphic Encryption for Bioinformatics.
Proc. IEEE, 2017

Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.
IEEE Secur. Priv., 2017

Postquantum Cryptography - State of the Art.
IEEE Secur. Priv., 2017

Hard and Easy Problems for Supersingular Isogeny Graphs.
IACR Cryptol. ePrint Arch., 2017

Cryptographic Pairings.
IACR Cryptol. ePrint Arch., 2017

Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Private Queries on Encrypted Genomic Data.
IACR Cryptol. ePrint Arch., 2017

PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.
Bioinform., 2017

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Constructing genus-3 hyperelliptic Jacobians with CM.
LMS J. Comput. Math., 2016

Vulnerable Galois RLWE Families and Improved Attacks.
IACR Cryptol. ePrint Arch., 2016

Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016

Variations of the McEliece Cryptosystem.
CoRR, 2016

HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS.
Bioinform., 2016

Security Considerations for Galois Non-dual RLWE Families.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016

2015
Private genome analysis through homomorphic encryption.
BMC Medical Informatics Decis. Mak., December, 2015

Genus-2 curves and Jacobians with a given number of points.
LMS J. Comput. Math., 2015

Privately Evaluating Decision Trees and Random Forests.
IACR Cryptol. ePrint Arch., 2015

Key Recovery for LWE in Polynomial Time.
IACR Cryptol. ePrint Arch., 2015

Ring-LWE Cryptography for the Number Theorist.
IACR Cryptol. ePrint Arch., 2015

Attacks on Search RLWE.
IACR Cryptol. ePrint Arch., 2015

Homomorphic Computation of Edit Distance.
Proceedings of the Financial Cryptography and Data Security, 2015

Provably Weak Instances of Ring-LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Evaluating Igusa functions.
Math. Comput., 2014

On the quaternion -isogeny path problem.
LMS J. Comput. Math., 2014

Constructing abelian surfaces for cryptography via Rosenhain invariants.
LMS J. Comput. Math., 2014

Private predictive analysis on encrypted medical data.
J. Biomed. Informatics, 2014

Time-Memory Trade-offs for Index Calculus in Genus 3.
IACR Cryptol. ePrint Arch., 2014

On the quaternion ℓ-isogeny path problem.
IACR Cryptol. ePrint Arch., 2014

Crypto-Nets: Neural Networks over Encrypted Data.
CoRR, 2014

Weak Instances of PLWE.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

Private Computation on Encrypted Genomic Data.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Fast Cryptography in Genus 2.
Proceedings of the Advances in Cryptology, 2013

High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
Modular polynomials via isogeny volcanoes.
Math. Comput., 2012

An arithmetic intersection formula for denominators of Igusa class polynomials.
IACR Cryptol. ePrint Arch., 2012

Improved CRT Algorithm for Class Polynomials in Genus 2.
IACR Cryptol. ePrint Arch., 2012

Two is Greater than One.
IACR Cryptol. ePrint Arch., 2012

Affine Pairings on ARM.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

ML Confidential: Machine Learning on Encrypted Data.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Practical applications of homomorphic encryption.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
A Gross-Zagier formula for quaternion algebras over totally real fields.
IACR Cryptol. ePrint Arch., 2011

Group Law Computations on Jacobians of Hyperelliptic Curves.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Can homomorphic encryption be practical?
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory.
Proceedings of the WIN - Women in Numbers - Research Directions in Number Theory., 2011

2010
Computing genus 2 curves from invariants on the Hilbert moduli space.
IACR Cryptol. ePrint Arch., 2010

Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields.
IACR Cryptol. ePrint Arch., 2010

Genus 2 Curves with Complex Multiplication.
IACR Cryptol. ePrint Arch., 2010

An Anonymous Health Care System.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

An Analysis of Affine Coordinates for Pairing Computation.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Cryptographic Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Modular Polynomials for Genus 2.
LMS J. Comput. Math., 2009

Patient controlled encryption: ensuring privacy of electronic medical records.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT).
RFC, September, 2008

Full Cryptanalysis of LPS and Morgenstern Hash Function.
IACR Cryptol. ePrint Arch., 2008

Full Cryptanalysis of LPS and Morgenstern Hash Functions.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group.
Proceedings of the Pairing-Based Cryptography, 2008

Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography.
Proceedings of the Pairing-Based Cryptography, 2008

Computing Hilbert Class Polynomials.
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008

2007
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields.
IACR Cryptol. ePrint Arch., 2007

Stronger Security of Authenticated Key Exchange.
Proceedings of the Provable Security, 2007

2006
Cryptographic hash functions from expander graphs.
IACR Cryptol. ePrint Arch., 2006

Security Analysis of KEA Authenticated Key Exchange Protocol.
Proceedings of the Public Key Cryptography, 2006

Signatures for Network Coding.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Computing Modular Polynomials.
LMS J. Comput. Math., 2005

2004
The advantages of elliptic curve cryptography for wireless security.
IEEE Wirel. Commun., 2004

Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Trading Inversions for Multiplications in Elliptic Curve Cryptography.
IACR Cryptol. ePrint Arch., 2003

Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation.
Proceedings of the Topics in Cryptology, 2003

2002
An Efficient Procedure to Double and Add Points on an Elliptic Curve.
IACR Cryptol. ePrint Arch., 2002

2001
Constructing elliptic curves with a given number of points over a finite field.
IACR Cryptol. ePrint Arch., 2001

1996
Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points.
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996


  Loading...