Search

Your search keyword '"Lauter K"' showing total 46 results

Search Constraints

Start Over You searched for: Author "Lauter K" Remove constraint Author: "Lauter K"
46 results on '"Lauter K"'

Search Results

1. SalsaPicante: A machine learning attack on LWE with binary secrets

2. Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees

4. Affine pairings on ARM

5. Variations of the McEliece cryptosystem

6. Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing

7. Twisted Hessian curves

8. Discrete Ziggurat: A Time-Memory Trade-Off for Sampling from a Gaussian Distribution over the Integers

9. Fast exhaustive search for quadratic systems in F_2 on FPGAs

10. ML Confidential : machine learning on encrypted data

11. ML Confidential : machine learning on encrypted data

12. Attractive subfamilies of BLS curves for implementing high-security pairings

13. Affine pairings on ARM

14. An Analysis of Affine Coordinates for Pairing Computation

16. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

21. Mutational analysis of CDKN1B, a candidate tumor-suppressor gene, in refractory secondary/tertiary hyperparathyroidism.

22. Time-memory trade-offs for index calculus in genus 3

24. Depth optimized efficient homomorphic sorting

25. Provable Second Preimage Resistance Revisited

26. High Precision Discrete Gaussian Sampling on FPGAs

27. Two Attacks on a White-Box AES Implementation

28. Secure human action recognition by encrypted neural network inference.

29. Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation.

30. Silver and gold nanoparticles as multi-chromatic lateral flow assay probes for the detection of food allergens.

31. Logistic regression over encrypted data from fully homomorphic encryption.

32. Secure Outsourced Matrix Computation and Application to Neural Networks.

33. Recovery of soluble proteins from migratory locust (Locusta migratoria) and characterisation of their compositional and techno-functional properties.

34. A community effort to protect genomic data sharing, collaboration and outsourcing.

35. PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.

36. Private queries on encrypted genomic data.

37. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

38. Development of soybeans with low P34 allergen protein concentration for reduced allergenicity of soy foods.

39. Protecting genomic data analytics in the cloud: state of the art and opportunities.

40. Diphtheria Toxin- and GFP-Based Mouse Models of Acquired Hypoparathyroidism and Treatment With a Long-Acting Parathyroid Hormone Analog.

41. HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS.

42. Private genome analysis through homomorphic encryption.

43. Private predictive analysis on encrypted medical data.

44. Analysis of CYP27B1, encoding 25-hydroxyvitamin D-1alpha-hydroxylase, as a candidate tumor suppressor gene in primary and severe secondary/tertiary hyperparathyroidism.

45. An unusual case of primary hyperparathyroidism with profoundly elevated parathyroid hormone levels.

46. Mutational analysis of the PTH 3'-untranslated region in parathyroid disorders.

Catalog

Books, media, physical & digital resources