122 results on '"Lauter, Kristin"'
Search Results
2. Private AI: Machine Learning on Encrypted Data
3. AWM and the Genius of Women: Reflections by AWM’s 22nd President
4. Explicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits Trees
5. Homomorphic Encryption Standard
6. Trusted Monitoring Service (TMS)
7. Shorter quantum circuits via single-qubit gate approximation
8. SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets
9. Transparency Tools for Fairness in AI (Luskin)
10. Supersingular isogeny graphs in cryptography
11. Ramanujan Graphs in Cryptography
12. Orienteering with One Endomorphism
13. Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions
14. Research Networks for Women
15. Security Considerations for Galois Non-dual RLWE Families
16. Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
17. Variations of the McEliece Cryptosystem
18. Secure human action recognition by encrypted neural network inference
19. Ring-LWE Cryptography for the Number Theorist
20. Homomorphic Computation of Edit Distance
21. Bad Reduction of Genus Three Curves with Complex Multiplication
22. Provably Weak Instances of Ring-LWE
23. Private Computation on Encrypted Genomic Data
24. Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
25. Adventures in Supersingularland
26. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
27. Open Imputation Server provides secure Imputation services with provable genomic privacy
28. Weak Instances of PLWE
29. In Memoriam: Peter L. Montgomery (1947–2020)
30. Fast Cryptography in Genus 2
31. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
32. ML Confidential: Machine Learning on Encrypted Data
33. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
34. Affine Pairings on ARM
35. AWM at 50 and Beyond
36. New methods for bounding the number of points on curves over finite fields
37. Group Law Computations on Jacobians of Hyperelliptic Curves
38. Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
39. Cryptographic Cloud Storage
40. An Analysis of Affine Coordinates for Pairing Computation
41. Families of Ramanujan graphs and quaternion algebras
42. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
43. Computing Hilbert Class Polynomials
44. Full Cryptanalysis of LPS and Morgenstern Hash Functions
45. Editor’s Preface for the Second Annual MathCrypt Proceedings Volume
46. Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation
47. Preface to the First Annual MathCrypt Proceedings Volume
48. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
49. A bound on the primes of bad reduction for CM curves of genus 3
50. How to Keep Your Secrets in a Post-Quantum World
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.