Search

Your search keyword '"Lauter, Kristin"' showing total 1,039 results

Search Constraints

Start Over You searched for: Author "Lauter, Kristin" Remove constraint Author: "Lauter, Kristin"
1,039 results on '"Lauter, Kristin"'

Search Results

1. Teaching Transformers Modular Arithmetic at Scale

2. Benchmarking Attacks on Learning with Errors

3. The cool and the cruel: separating hard parts of LWE secrets

4. Machine learning for modular multiplication

5. Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

9. SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

10. SALSA PICANTE: a machine learning attack on LWE with binary secrets

11. An efficient algorithm for integer lattice reduction

12. Determining the primes of bad reduction of CM curves of genus 3

13. SALSA: Attacking Lattice Cryptography with Transformers

14. Orientations and cycles in supersingular isogeny graphs

15. Shorter quantum circuits via single-qubit gate approximation

16. Orienteering with one endomorphism

17. A Cryptographic Hash Function from Markoff Triples

19. Secure Human Action Recognition by Encrypted Neural Network Inference

20. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

21. Transparency Tools for Fairness in AI (Luskin)

23. Adventures in Supersingularland

24. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

25. XONN: XNOR-based Oblivious Deep Neural Network Inference

26. Private AI: Machine Learning on Encrypted Data

28. Homomorphic Encryption Standard

30. CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs

31. Modular invariants for genus 3 hyperelliptic curves

32. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

33. Ramanujan graphs in cryptography

34. Attacks on the Search-RLWE problem with small errors

35. Security considerations for Galois non-dual RLWE families

36. Quantum resource estimates for computing elliptic curve discrete logarithms

38. Ramanujan Graphs in Cryptography

39. Variations of the McEliece Cryptosystem

40. A bound on the primes of bad reduction for CM curves of genus 3

41. Constructing genus 3 hyperelliptic Jacobians with CM

43. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

44. Variations of the McEliece Cryptosystem

45. Ring-LWE Cryptography for the Number Theorist

46. Provably weak instances of Ring-LWE

47. Crypto-Nets: Neural Networks over Encrypted Data

48. Bad reduction of genus $3$ curves with complex multiplication

49. On the quaternion $\ell$-isogeny path problem

50. Genus-2 curves and Jacobians with a given number of points

Catalog

Books, media, physical & digital resources