Kristin Lauter
American cryptographer
Kristin Lauter's AcademicInfluence.com Rankings
Download Badge
Computer Science Mathematics
Kristin Lauter's Degrees
- PhD Mathematics University of Chicago
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Kristin Lauter Influential?
(Suggest an Edit or Addition)According to Wikipedia, Kristin Estella Lauter is an American mathematician and cryptographer whose research interest is broadly in application of number theory and algebraic geometry in cryptography. She is particularly known for her work in the area of elliptic curve cryptography. She was a researcher at Microsoft Research in Redmond, Washington, from 1999–2021 and the head of the Cryptography Group from 2008–2021; her group developed Microsoft SEAL. In April 2021, Lauter joined Facebook AI Research as the West Coast Head of Research Science. She became the President-Elect of the Association for Women in Mathematics in February 2014 and served as President February 1, 2015 - January 31, 2017.
Kristin Lauter's Published Works
Published Works
- Cryptographic Cloud Storage (2010) (1455)
- CryptoNets: applying neural networks to encrypted data with high throughput and accuracy (2016) (1143)
- Can homomorphic encryption be practical? (2011) (995)
- Stronger Security of Authenticated Key Exchange (2006) (611)
- Patient controlled encryption: ensuring privacy of electronic medical records (2009) (521)
- The advantages of elliptic curve cryptography for wireless security (2004) (438)
- ML Confidential: Machine Learning on Encrypted Data (2012) (433)
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme (2013) (415)
- Cryptographic Hash Functions from Expander Graphs (2008) (328)
- Private Predictive Analysis on Encrypted Medical Data (2014) (255)
- Signatures for Network Coding (2006) (247)
- XONN: XNOR-based Oblivious Deep Neural Network Inference (2019) (193)
- Private Computation on Encrypted Genomic Data (2014) (172)
- Secure Outsourced Matrix Computation and Application to Neural Networks (2018) (169)
- Trading Inversions for Multiplications in Elliptic Curve Cryptography (2006) (167)
- Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms (2017) (139)
- Privately Evaluating Decision Trees and Random Forests (2016) (134)
- CHET: an optimizing compiler for fully-homomorphic neural-network inferencing (2019) (132)
- Manual for Using Homomorphic Encryption for Bioinformatics (2017) (128)
- Crypto-Nets: Neural Networks over Encrypted Data (2014) (126)
- Homomorphic Computation of Edit Distance (2015) (119)
- Private genome analysis through homomorphic encryption (2015) (119)
- Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation (2002) (113)
- Modular polynomials via isogeny volcanoes (2010) (103)
- Logistic regression over encrypted data from fully homomorphic encryption (2018) (98)
- HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS (2015) (93)
- Security Analysis of KEA Authenticated Key Exchange Protocol (2006) (93)
- Provably Weak Instances of Ring-LWE (2015) (91)
- Fast Cryptography in Genus 2 (2013) (87)
- PRINCESS: Privacy‐protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS (2017) (81)
- A CRT ALGORITHM FOR CONSTRUCTING GENUS 2 CURVES OVER FINITE FIELDS (2004) (74)
- Geometric Methods for Improving the Upper Bounds on the Number of Rational Points on Algebraic Curves over Finite Fields (2001) (68)
- Computing Hilbert Class Polynomials (2008) (68)
- Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions (2018) (68)
- On the quaternion ℓ-isogeny path problem (2014) (67)
- Homomorphic Encryption Standard (2019) (66)
- Weak Instances of PLWE (2014) (65)
- Class Invariants for Quartic CM Fields (2004) (59)
- SECURITY OF HOMOMORPHIC ENCRYPTION (2017) (58)
- Private Collaborative Neural Network Learning (2017) (56)
- Protecting genomic data analytics in the cloud: state of the art and opportunities (2016) (50)
- The Maximum or Minimum Number of Rational Points on Genus Three Curves over Finite Fields (2002) (49)
- An Analysis of Affine Coordinates for Pairing Computation (2010) (46)
- Group Law Computations on Jacobians of Hyperelliptic Curves (2011) (43)
- Improved upper bounds for the number of points on curves over finite fields (2002) (43)
- High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition (2013) (43)
- Genus 2 Curves with Complex Multiplication (2010) (43)
- Computing endomorphism rings of Jacobians of genus 2 curves over finite fields (2007) (40)
- Full Cryptanalysis of LPS and Morgenstern Hash Functions (2008) (40)
- PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension (2017) (37)
- Attacks on Search RLWE (2015) (36)
- Ultra-Fast Homomorphic Encryption Models enable Secure Outsourcing of Genotype Imputation (2020) (35)
- CONSTRUCTING ELLIPTIC CURVES WITH A KNOWN NUMBER OF POINTS OVER A PRIME FIELD (2001) (35)
- A community effort to protect genomic data sharing, collaboration and outsourcing (2017) (34)
- Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings (2011) (34)
- Computing Modular Polynomials (2004) (34)
- Selected Areas in Cryptography -- SAC 2013 (2013) (32)
- Vulnerable Galois RLWE Families and Improved Attacks (2016) (31)
- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography (2008) (30)
- Private queries on encrypted genomic data (2017) (30)
- Pointless curves of genus three and four (2004) (29)
- Affine Pairings on ARM (2012) (28)
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences (2008) (28)
- An arithmetic intersection formula for denominators of Igusa class polynomials (2012) (27)
- Computing genus 2 curves from invariants on the Hilbert moduli space (2011) (27)
- Key Recovery for LWE in Polynomial Time (2015) (27)
- Improved Weil and Tate Pairings for Elliptic and Hyperelliptic Curves (2003) (27)
- Constructing genus 3 hyperelliptic Jacobians with CM (2016) (26)
- Hard and Easy Problems for Supersingular Isogeny Graphs (2017) (26)
- On Singular Moduli for Arbitrary Discriminants (2012) (26)
- Security Considerations for Galois Non-dual RLWE Families (2016) (25)
- Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points (1996) (25)
- Explicit CM theory for level 2-structures on abelian surfaces (2009) (25)
- Modular polynomials for genus 2 (2008) (24)
- Non-existence of a curve over ₃ of genus 5 with 14 rational points (1999) (24)
- Secure Data Exchange: A Marketplace in the Cloud (2019) (24)
- Practical applications of homomorphic encryption (2012) (24)
- Improved upper bounds for the number of rational points on algebraic curves over finite fields (1999) (23)
- Ramanujan graphs in cryptography (2018) (23)
- Attacks on the Search-RLWE problem with small errors (2017) (21)
- Genus-2 curves and Jacobians with a given number of points (2014) (21)
- New methods for bounding the number of points on curves over finite fields (2012) (21)
- A Formula for Constructing Curves over Finite Fields with Many Rational Points (1999) (21)
- Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves (2018) (20)
- Deligne–Lusztig curves as ray class fields (1999) (20)
- Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs (2017) (18)
- On the quaternion $\ell$-isogeny path problem (2014) (17)
- Zeta Functions of Curves over Finite Fields with Many Rational Points (2000) (16)
- Improved CRT Algorithm for Class Polynomials in Genus 2 (2013) (16)
- Selected areas in cryptography SAC 2013 : 20th International Conference Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers (2014) (16)
- The maximum or minimum number of rational points on curves of genus three over finite fields (2001) (15)
- Ring-LWE Cryptography for the Number Theorist (2015) (15)
- Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance (2019) (14)
- Elliptic Curve Cryptography (ECC) Support for Public Key Cryptography for Initial Authentication in Kerberos (PKINIT) (2008) (14)
- Explicit Heegner Points: Kolyvagin's Conjecture and Non-trivial Elements in the Shafarevich-Tate Group (2007) (14)
- Bad Reduction of Genus Three Curves with Complex Multiplication (2015) (13)
- A bound on the primes of bad reduction for CM curves of genus 3 (2016) (12)
- THE EQUIVALENCE OF THE GEOMETRIC AND ALGEBRAIC GROUP LAWS FOR JACOBIANS OF GENUS 2 CURVES (2001) (12)
- Cayley Hashes: A Class of Efficient Graph-based Hash Functions (2012) (12)
- Postquantum Cryptography - State of the Art (2017) (12)
- Variations of the McEliece Cryptosystem (2016) (11)
- HILBERT THETA SERIES AND INVARIANTS OF GENUS 2 CURVES (2016) (11)
- Adventures in Supersingularland (2019) (11)
- Patient Controlled Encryption: Patient Privacy in Electronic Medical Records (2009) (10)
- Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants (2014) (10)
- Topics in Algebraic and Noncommutative Geometry (2003) (9)
- Evil Primes and Superspecial Moduli (2005) (9)
- CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs (2018) (9)
- Time-memory trade-offs for index calculus in genus 3 (2015) (9)
- PRIMES IN THE DENOMINATORS OF IGUSA CLASS POLYNOMIALS (2003) (9)
- HEAR: Human Action Recognition via Neural Networks on Homomorphically Encrypted Data (2021) (8)
- SECRET : Secure Edit-distance Computation over homomoRphic Encrypted daTa (2015) (8)
- The distance between superspecial abelian varieties with real multiplication (2009) (8)
- Private AI: Machine Learning on Encrypted Data (2021) (8)
- ReDCrypt: Real-Time Privacy-Preserving Deep Learning Inference in Clouds Using FPGAs (2018) (7)
- Two is Greater than One (2012) (7)
- SALSA: Attacking Lattice Cryptography with Transformers (2022) (7)
- On the Concrete Security of LWE with Small Secret (2020) (6)
- Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey (2021) (6)
- Computational Arithmetic Geometry (2008) (6)
- Advances in the Mathematical Sciences (2016) (6)
- Modular invariants for genus 3 hyperelliptic curves (2018) (6)
- A Gross-Zagier formula for quaternion algebras over totally real fields (2011) (6)
- Computing Igusa class polynomials via the Chinese Remainder Theorem (2004) (5)
- Explicit CM-theory in dimension 2 (2009) (5)
- Shorter quantum circuits (2022) (5)
- Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields (2013) (5)
- Postquantum Cryptography, Part 2 (2018) (5)
- An Anonymous Health Care System (2010) (5)
- ON THE COMPUTATION OF THE CASSELS PAIRING FOR CERTAIN KOLYVAGIN CLASSES IN THE SHAFAREVICH-TATE GROUP (2006) (5)
- An Efficient Procedure to Double and Add Points on an Elliptic Curve (2002) (5)
- Abelian surfaces admitting an (l,l)-endomorphism (2011) (5)
- Orienteering with one endomorphism (2022) (4)
- WIN - Women in Numbers - Research Directions in Number Theory (2011) (4)
- Bad reduction of genus $3$ curves with complex multiplication (2014) (4)
- Secure human action recognition by encrypted neural network inference (2021) (4)
- Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey (2020) (4)
- Open Imputation Server provides secure Imputation services with provable genomic privacy (2021) (4)
- Constructing elliptic curves with a given number of points over a finite field (2001) (3)
- Algebraic Geometry for Coding Theory and Cryptography (2017) (3)
- Igusa Class Polynomials, Embedding of Quartic CM Fields, and Arithmetic Intersection Theory (2010) (3)
- Progress in Cryptology -- LATINCRYPT 2015 (2015) (3)
- ReDCrypt (2018) (3)
- Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282 (2013) (3)
- A Cryptographic Hash Function from Markoff Triples (2021) (3)
- BOUNDS FOR THE NUMBER OF POINTS ON CURVES OVER FINITE FIELDS (2008) (2)
- Comparing arithmetic intersection formulas for denominators of Igusa class polynomials (2012) (2)
- Evaluating Igusa functions (2010) (2)
- Progress in cryptology : LATINCRYPT 2015 : 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23-26, 2015 : proceedings (2015) (2)
- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group (2008) (1)
- Transparency Tools for Fairness in AI (Luskin) (2020) (1)
- Fast Cryptography in Genus 2 ( Two is Greater than One ) (2013) (1)
- Trusted Monitoring Service (TMS) (2021) (1)
- On Singular Moduli (2013) (1)
- ReDCrypt: RealTime Privacy Preserving Deep Learning Using FPGAs (2018) (1)
- Orientations and cycles in supersingular isogeny graphs (2022) (1)
- Explicit connections between supersingular isogeny graphs and Bruhat - Tits trees (2021) (1)
- Advances in the Mathematical Sciences : Research from the 2015 Association for Women in Mathematics Symposium (2016) (1)
- AWM at 50 and Beyond (2021) (1)
- 2 5 A pr 2 00 1 Geometric Methods for Improving the Upper Bounds on the Number of Rational Points on Algebraic Curves over Finite Fields (2008) (0)
- University of Groningen Modular invariants for genus 3 hyperelliptic curves (2018) (0)
- Research Networks for Women (2022) (0)
- Supersingular isogeny graphs in cryptography (2019) (0)
- PAlmetto Joint Arithmetic , Modularity , and Analysis Series Saturday-Sunday , December 5-6 , 2020 Titles and Abstracts (2020) (0)
- Algebra & Number Theory (2013) (0)
- An efficient algorithm for integer lattice reduction (2023) (0)
- Denominators of Igusa Class Polynomials (2015) (0)
- Introduction to AWM Research Symposium Lecture Sampler (2017) (0)
- PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension (2017) (0)
- Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields (2012) (0)
- Modular invariants for genus 3 hyperelliptic curves (2019) (0)
- Determining the primes of bad reduction of CM curves of genus 3 (2022) (0)
- Cryptographic Pairings (2017) (0)
- Fast Cryptography in Genus 2 (2014) (0)
- CRYPTOGRAPHY FOR THE NUMBER THEORIST (2015) (0)
- Modular invariants for genus 3 hyperelliptic curves. Research in Number Theory , 5 (1), [9]. (2018) (0)
- In Memoriam: Peter L. Montgomery (1947–2020) (2021) (0)
- Ju l 2 00 2 IMPROVED UPPER BOUNDS FOR THE NUMBER OF POINTS ON CURVES OVER FINITE FIELDS (2006) (0)
- Private Data, Public Computation (2012) (0)
- Private queries on encrypted genomic data (2017) (0)
- Geometri Methods for Improving the Upper Bounds on the Number of Rational Points on Algebrai Curves over Finite Fields (2001) (0)
- SALSA PICANTE: a machine learning attack on LWE with binary secrets (2023) (0)
- 1 A Consumer Architecture (2010) (0)
- Editor’s Preface for the Second Annual MathCrypt Proceedings Volume (2020) (0)
- SparkFHE: Distributed Dataflow Framework with Fully Homomorphic Encryption (2020) (0)
- N T ] 4 F eb 2 00 9 MODULAR POLYNOMIALS FOR GENUS 2 (2021) (0)
- Protecting genomic data analytics in the cloud: state of the art and opportunities (2016) (0)
- Constructing Kolyvagin Classes : Kolyvagin ’ s Conjecture and Nontrivial Elements in the Shafarevich-Tate Group (2006) (0)
- Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051) (2016) (0)
- Logistic regression over encrypted data from fully homomorphic encryption (2018) (0)
- Preface to the First Annual MathCrypt Proceedings Volume (2020) (0)
- Under surveillance (2012) (0)
- Preface : Selected areas in cryptography - SAC 2013 : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers (2014) (0)
- Proceedings of the 4th International Conference on Progress in Cryptology -- LATINCRYPT 2015 - Volume 9230 (2015) (0)
- How to Keep Your Secrets in a Post-Quantum World (2020) (0)
- A ug 2 00 2 IMPROVED UPPER BOUNDS FOR THE NUMBER OF POINTS ON CURVES OVER FINITE FIELDS (2006) (0)
- Computational arithmetic geometry : AMS special session, April 29-30, 2006, San Francisco State University, San Francisco, California (2008) (0)
- AN EFFICIENT PROCEDURE TO DOUBLE AND ADDPOINTS ON AN ELLIPTIC (2002) (0)
- Annual Women in Mathematics in Southern California Symposium January (2012) (0)
- A community effort to protect genomic data sharing, collaboration and outsourcing (2017) (0)
This paper list is powered by the following services:
Other Resources About Kristin Lauter
What Schools Are Affiliated With Kristin Lauter?
Kristin Lauter is affiliated with the following schools: