1,039 results on '"Lauter, Kristin"'
Search Results
102. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
103. High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition
104. Fast Cryptography in Genus 2
105. ML Confidential: Machine Learning on Encrypted Data
106. Affine Pairings on ARM
107. Group Law Computations on Jacobians of Hyperelliptic Curves
108. Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings
109. Time-memory trade-offs for index calculus in genus 3
110. Research Networks for Women
111. An Analysis of Affine Coordinates for Pairing Computation
112. Cryptographic Cloud Storage
113. Private predictive analysis on encrypted medical data
114. The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences
115. EVALUATING IGUSA FUNCTIONS
116. Full Cryptanalysis of LPS and Morgenstern Hash Functions
117. Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
118. Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
119. Security Considerations for Galois Non-dual RLWE Families
120. Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms
121. Stronger Security of Authenticated Key Exchange
122. Logistic regression over encrypted data from fully homomorphic encryption
123. Security Analysis of KEA Authenticated Key Exchange Protocol
124. Fast Cryptography in Genus 2
125. Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves
126. Abelian surfaces admitting an [formula omitted]-endomorphism
127. Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation
128. Zeta Functions of Curves over Finite Fields with Many Rational Points
129. MODULAR POLYNOMIALS VIA ISOGENY VOLCANOES
130. Shorter quantum circuits
131. A community effort to protect genomic data sharing, collaboration and outsourcing
132. Ray class field constructions of curves over finite fields with many rational points
133. Computing genus 2 curves from invariants on the Hilbert moduli space
134. HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
135. Homomorphic Computation of Edit Distance
136. Provably Weak Instances of Ring-LWE
137. Private Computation on Encrypted Genomic Data
138. Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
139. Adventures in Supersingularland
140. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey
141. Open Imputation Server provides secure Imputation services with provable genomic privacy
142. Adventures in Supersingularland
143. The distance between superspecial abelian varieties with real multiplication
144. Explicit Heegner points: Kolyvagin's conjecture and non-trivial elements in the Shafarevich–Tate group
145. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.
146. Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
147. Weak Instances of PLWE
148. Cryptographic Hash Functions from Expander Graphs
149. In Memoriam: Peter L. Montgomery (1947–2020)
150. Trading Inversions for Multiplications in Elliptic Curve Cryptography
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.