What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kristin E. Lauter
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Benchmarking Attacks on Learning with Errors.
Emily Wenger
Eshika Saxena
Mohamed Malhou
Ellie Thieu
Kristin E. Lauter
2024
conf/africacrypt
The Cool and the Cruel: Separating Hard Parts of LWE Secrets.
Niklas Nolte
Mohamed Malhou
Emily Wenger
Samuel Stevens
Cathy Yuanchen Li
François Charton
Kristin E. Lauter
2023
conf/ccs
SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets.
Cathy Yuanchen Li
Jana Sotáková
Emily Wenger
Mohamed Malhou
Evrard Garcelon
François Charton
Kristin E. Lauter
2019
conf/ccs
Secure Data Exchange: A Marketplace in the Cloud.
Ran Gilad-Bachrach
Kim Laine
Kristin E. Lauter
Peter Rindal
Mike Rosulek
2019
conf/uss
XONN: XNOR-based Oblivious Deep Neural Network Inference.
M. Sadegh Riazi
Mohammad Samragh
Hao Chen
Kim Laine
Kristin E. Lauter
Farinaz Koushanfar
2018
conf/ccs
Secure Outsourced Matrix Computation and Application to Neural Networks.
Xiaoqian Jiang
Miran Kim
Kristin E. Lauter
Yongsoo Song
2018
conf/eurocrypt
Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions.
Kirsten Eisenträger
Sean Hallgren
Kristin E. Lauter
Travis Morrison
Christophe Petit
2017
conf/asiacrypt
Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.
Martin Roetteler
Michael Naehrig
Krysta M. Svore
Kristin E. Lauter
2016
journals/popets
Privately Evaluating Decision Trees and Random Forests.
David J. Wu
Tony Feng
Michael Naehrig
Kristin E. Lauter
2016
journals/joc
Fast Cryptography in Genus 2.
Joppe W. Bos
Craig Costello
Hüseyin Hisil
Kristin E. Lauter
2016
conf/sacrypt
Security Considerations for Galois Non-dual RLWE Families.
Hao Chen
Kristin E. Lauter
Katherine E. Stange
2015
conf/crypto
Provably Weak Instances of Ring-LWE.
Yara Elias
Kristin E. Lauter
Ekin Ozman
Katherine E. Stange
2015
conf/fc
Homomorphic Computation of Edit Distance.
Jung Hee Cheon
Miran Kim
Kristin E. Lauter
2014
conf/latincrypt
Private Computation on Encrypted Genomic Data.
Kristin E. Lauter
Adriana López-Alt
Michael Naehrig
2014
conf/sacrypt
Weak Instances of PLWE.
Kirsten Eisenträger
Sean Hallgren
Kristin E. Lauter
2013
conf/ches
High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition.
Joppe W. Bos
Craig Costello
Hüseyin Hisil
Kristin E. Lauter
2013
conf/eurocrypt
Fast Cryptography in Genus 2.
Joppe W. Bos
Craig Costello
Hüseyin Hisil
Kristin E. Lauter
2012
conf/ccs
Practical applications of homomorphic encryption.
Kristin E. Lauter
2012
conf/icisc
ML Confidential: Machine Learning on Encrypted Data.
Thore Graepel
Kristin E. Lauter
Michael Naehrig
2011
conf/ccs
Can homomorphic encryption be practical?
Michael Naehrig
Kristin E. Lauter
Vinod Vaikuntanathan
2011
conf/sacrypt
Group Law Computations on Jacobians of Hyperelliptic Curves.
Craig Costello
Kristin E. Lauter
2010
conf/uss
An Anonymous Health Care System.
Melissa Chase
Kristin E. Lauter
2010
conf/fc
Cryptographic Cloud Storage.
Seny Kamara
Kristin E. Lauter
2009
journals/joc
Cryptographic Hash Functions from Expander Graphs.
Denis Xavier Charles
Kristin E. Lauter
Eyal Z. Goren
2009
conf/ccs
Patient controlled encryption: ensuring privacy of electronic medical records.
Josh Benaloh
Melissa Chase
Eric Horvitz
Kristin E. Lauter
2008
conf/sacrypt
The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.
Kristin E. Lauter
Katherine E. Stange
2007
conf/provsec
Stronger Security of Authenticated Key Exchange.
Brian A. LaMacchia
Kristin E. Lauter
Anton Mityagin
2006
conf/pkc
Security Analysis of KEA Authenticated Key Exchange Protocol.
Kristin E. Lauter
Anton Mityagin
2003
conf/ctrsa
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation.
Kirsten Eisenträger
Kristin E. Lauter
Peter L. Montgomery
Coauthors
Adriana López-Alt
(1)
Anton Mityagin
(2)
Brian A. LaMacchia
(1)
Cathy Yuanchen Li
(2)
Christophe Petit
(1)
Craig Costello
(4)
David J. Wu
(1)
Denis Xavier Charles
(1)
Ekin Ozman
(1)
Ellie Thieu
(1)
Emily Wenger
(3)
Eric Horvitz
(1)
Eshika Saxena
(1)
Evrard Garcelon
(1)
Eyal Z. Goren
(1)
Farinaz Koushanfar
(1)
François Charton
(2)
Hao Chen
(2)
Hüseyin Hisil
(3)
Jana Sotáková
(1)
Joppe W. Bos
(3)
Josh Benaloh
(1)
Jung Hee Cheon
(1)
Katherine E. Stange
(3)
Kim Laine
(2)
Kirsten Eisenträger
(3)
Kristin E. Lauter
(29)
Krysta M. Svore
(1)
M. Sadegh Riazi
(1)
Martin Roetteler
(1)
Melissa Chase
(2)
Michael Naehrig
(5)
Mike Rosulek
(1)
Miran Kim
(2)
Mohamed Malhou
(3)
Mohammad Samragh
(1)
Niklas Nolte
(1)
Peter L. Montgomery
(1)
Peter Rindal
(1)
Ran Gilad-Bachrach
(1)
Samuel Stevens
(1)
Sean Hallgren
(2)
Seny Kamara
(1)
Thore Graepel
(1)
Tony Feng
(1)
Travis Morrison
(1)
Vinod Vaikuntanathan
(1)
Xiaoqian Jiang
(1)
Yara Elias
(1)
Yongsoo Song
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to