Search

Your search keyword '"Lauter, Kristin"' showing total 65 results

Search Constraints

Start Over You searched for: Author "Lauter, Kristin" Remove constraint Author: "Lauter, Kristin" Database arXiv Remove constraint Database: arXiv
65 results on '"Lauter, Kristin"'

Search Results

1. Teaching Transformers Modular Arithmetic at Scale

2. Benchmarking Attacks on Learning with Errors

3. The cool and the cruel: separating hard parts of LWE secrets

4. Machine learning for modular multiplication

5. Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

6. SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

7. SALSA PICANTE: a machine learning attack on LWE with binary secrets

8. An efficient algorithm for integer lattice reduction

9. Determining the primes of bad reduction of CM curves of genus 3

10. SALSA: Attacking Lattice Cryptography with Transformers

11. Orientations and cycles in supersingular isogeny graphs

12. Shorter quantum circuits via single-qubit gate approximation

13. Orienteering with one endomorphism

14. A Cryptographic Hash Function from Markoff Triples

15. Secure Human Action Recognition by Encrypted Neural Network Inference

16. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

17. Transparency Tools for Fairness in AI (Luskin)

18. Adventures in Supersingularland

19. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

20. XONN: XNOR-based Oblivious Deep Neural Network Inference

21. CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs

22. Modular invariants for genus 3 hyperelliptic curves

23. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

24. Ramanujan graphs in cryptography

25. Attacks on the Search-RLWE problem with small errors

26. Security considerations for Galois non-dual RLWE families

27. Quantum resource estimates for computing elliptic curve discrete logarithms

28. Variations of the McEliece Cryptosystem

29. A bound on the primes of bad reduction for CM curves of genus 3

30. Constructing genus 3 hyperelliptic Jacobians with CM

31. Ring-LWE Cryptography for the Number Theorist

32. Provably weak instances of Ring-LWE

33. Crypto-Nets: Neural Networks over Encrypted Data

34. Bad reduction of genus $3$ curves with complex multiplication

35. On the quaternion $\ell$-isogeny path problem

36. Genus-2 curves and Jacobians with a given number of points

37. Comparing arithmetic intersection formulas for denominators of Igusa class polynomials

38. An arithmetic intersection formula for denominators of Igusa class polynomials

39. On singular moduli for arbitrary discriminants

40. New methods for bounding the number of points on curves over finite fields

41. A Gross-Zagier formula for quaternion algebras over totally real fields

42. Abelian surfaces admitting an (l,l)-endomorphism

43. Igusa class polynomials, embeddings of quartic CM fields, and arithmetic intersection theory

44. Evaluating Igusa functions

45. Genus 2 Curves with Complex Multiplication

46. Modular polynomials via isogeny volcanoes

47. Explicit CM-theory for level 2-structures on abelian surfaces

48. Modular polynomials for genus 2

49. The elliptic curve discrete logarithm problem and equivalent hard problems for elliptic divisibility sequences

50. Computing Hilbert Class Polynomials

Catalog

Books, media, physical & digital resources