Search

Your search keyword '"Lauter, Kristin"' showing total 296 results

Search Constraints

Start Over You searched for: Author "Lauter, Kristin" Remove constraint Author: "Lauter, Kristin" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
296 results on '"Lauter, Kristin"'

Search Results

1. Teaching Transformers Modular Arithmetic at Scale

2. Benchmarking Attacks on Learning with Errors

3. The cool and the cruel: separating hard parts of LWE secrets

4. Machine learning for modular multiplication

5. Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

7. SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

8. SALSA PICANTE: a machine learning attack on LWE with binary secrets

9. An efficient algorithm for integer lattice reduction

10. Determining the primes of bad reduction of CM curves of genus 3

11. SALSA: Attacking Lattice Cryptography with Transformers

12. Orientations and cycles in supersingular isogeny graphs

13. Shorter quantum circuits via single-qubit gate approximation

14. Orienteering with one endomorphism

15. A Cryptographic Hash Function from Markoff Triples

16. Secure Human Action Recognition by Encrypted Neural Network Inference

17. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

18. Transparency Tools for Fairness in AI (Luskin)

19. Adventures in Supersingularland

20. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

21. XONN: XNOR-based Oblivious Deep Neural Network Inference

22. Private AI: Machine Learning on Encrypted Data

23. CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs

24. Modular invariants for genus 3 hyperelliptic curves

25. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

26. Ramanujan graphs in cryptography

27. Attacks on the Search-RLWE problem with small errors

28. Security considerations for Galois non-dual RLWE families

29. Quantum resource estimates for computing elliptic curve discrete logarithms

31. Variations of the McEliece Cryptosystem

32. A bound on the primes of bad reduction for CM curves of genus 3

33. Constructing genus 3 hyperelliptic Jacobians with CM

34. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

35. Ring-LWE Cryptography for the Number Theorist

36. Provably weak instances of Ring-LWE

37. Crypto-Nets: Neural Networks over Encrypted Data

38. Bad reduction of genus $3$ curves with complex multiplication

39. On the quaternion $\ell$-isogeny path problem

40. Genus-2 curves and Jacobians with a given number of points

42. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

43. Comparing arithmetic intersection formulas for denominators of Igusa class polynomials

44. An arithmetic intersection formula for denominators of Igusa class polynomials

45. On singular moduli for arbitrary discriminants

46. New methods for bounding the number of points on curves over finite fields

47. A Gross-Zagier formula for quaternion algebras over totally real fields

48. Abelian surfaces admitting an (l,l)-endomorphism

49. Igusa class polynomials, embeddings of quartic CM fields, and arithmetic intersection theory

50. Evaluating Igusa functions

Catalog

Books, media, physical & digital resources