Kristin E. Lauter
Orcid: 0000-0002-1320-696XAffiliations:
- Microsoft Research, Redmond
According to our database1,
Kristin E. Lauter
authored at least 116 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
On csauthors.net:
Bibliography
2024
SIAM J. Matrix Anal. Appl., March, 2024
SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Quantum, December, 2023
IACR Cryptol. ePrint Arch., 2023
SALSA VERDE: a machine learning attack on Learning with Errors with sparse small secrets.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.
ACM Comput. Surv., 2022
2021
J. Math. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data.
CoRR, 2021
2020
J. Math. Cryptol., 2020
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey.
CoRR, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019
Proceedings of the Surveys in Combinatorics, 2019: Invited lectures from the 27th British Combinatorial Conference, Birmingham, UK, July 29, 2019
2018
ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs.
ACM Trans. Reconfigurable Technol. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
SIAM J. Appl. Algebra Geom., 2017
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.
Bioinform., 2017
2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051).
Dagstuhl Reports, 2016
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS.
Bioinform., 2016
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016
2015
BMC Medical Informatics Decis. Mak., December, 2015
LMS J. Comput. Math., 2015
2014
LMS J. Comput. Math., 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields.
Des. Codes Cryptogr., 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory.
Proceedings of the WIN - Women in Numbers - Research Directions in Number Theory., 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT).
RFC, September, 2008
IACR Cryptol. ePrint Arch., 2008
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Pairing-Based Cryptography, 2008
2007
IACR Cryptol. ePrint Arch., 2007
2006
Des. Codes Cryptogr., 2006
2005
IACR Cryptol. ePrint Arch., 2005
2004
IEEE Wirel. Commun., 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Topics in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
2001
IACR Cryptol. ePrint Arch., 2001
1996
Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points.
Proceedings of the Algorithmic Number Theory, Second International Symposium, 1996