1,039 results on '"Lauter, Kristin"'
Search Results
202. On the quaternion l-isogeny path problem
203. On the quaternion l-isogeny path problem
204. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.
205. Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.
206. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.
207. Pointless curves of genus three and four
208. Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography
209. Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group
210. Stronger Security of Authenticated Key Exchange
211. Cryptographic Pairings
212. On Singular Moduli for Arbitrary Discriminants
213. Fast Cryptography in Genus 2
214. Constructing abelian surfaces for cryptography via Rosenhain invariants
215. On the quaternion -isogeny path problem
216. Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation
217. Safety in the cloud
218. Private Computation on Encrypted Genomic Data.
219. Homomorphic Computation of Edit Distance.
220. Bad Reduction of Genus Three Curves with Complex Multiplication.
221. Provably Weak Instances of Ring-LWE.
222. Geometric methods for improving the upper bounds on the number of rational points on algebraic curves over finite fields
223. The maximum or minimum number of rational points on curves of genus three over finite fields
224. Cayley Hashes: A Class of Efficient Graph-based Hash Functions
225. Group law computations on Jacobians of hyperelliptic curves
226. Attractive subfamilies of BLS curves for implementing high-security pairings
227. On graph-based cryptographic hash functions
228. Full cryptanalysis of LPS and Morgenstern hash Functions
229. Improved CRT algorithm for class polynomials in genus 2
230. Abelian surfaces admitting an(l,l)-endomorphism
231. A Gross–Zagier formula for quaternion algebras over totally real fields
232. Comparing Arithmetic Intersection Formulas for Denominators of Igusa Class Polynomials
233. Protecting genomic data analytics in the cloud: state of the art and opportunities.
234. Hilbert theta series and invariants of genus 2 curves.
235. HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS.
236. Weak Instances of PLWE.
237. Practical applications of homomorphic encryption
238. Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
239. Explicit CM theory for level 2-structures on abelian surfaces
240. Modular polynomials via isogeny volcanoes
241. Genus 2 Curves with Complex Multiplication
242. Igusa class polynomials, embeddings of quartic CM fields, and arithmetic intersection theory
243. The zeta-function of a quasi-ordinary singularity.II.
244. On Puiseux exponents for higher dimensional singularities
245. Patient controlled encryption
246. Signatures for network coding
247. Modular Polynomials for Genus 2
248. Constructing elliptic curves with a known number of points over a prime field
249. Computing endomorphism rings of Jacobians of genus 2 curves over finite fields
250. Cryptographic Hash Functions from Expander Graphs
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.