Search

Your search keyword '"Lauter, Kristin"' showing total 968 results

Search Constraints

Start Over You searched for: Author "Lauter, Kristin" Remove constraint Author: "Lauter, Kristin"
968 results on '"Lauter, Kristin"'

Search Results

1. Benchmarking Attacks on Learning with Errors

2. The cool and the cruel: separating hard parts of LWE secrets

3. Machine learning for modular multiplication

4. Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

8. SALSA VERDE: a machine learning attack on Learning With Errors with sparse small secrets

9. SALSA PICANTE: a machine learning attack on LWE with binary secrets

10. An efficient algorithm for integer lattice reduction

11. Determining the primes of bad reduction of CM curves of genus 3

12. SALSA: Attacking Lattice Cryptography with Transformers

13. Orientations and cycles in supersingular isogeny graphs

14. Shorter quantum circuits via single-qubit gate approximation

15. Orienteering with one endomorphism

17. A Cryptographic Hash Function from Markoff Triples

18. Secure Human Action Recognition by Encrypted Neural Network Inference

19. Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey

20. Transparency Tools for Fairness in AI (Luskin)

22. Adventures in Supersingularland

23. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance

24. XONN: XNOR-based Oblivious Deep Neural Network Inference

25. CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs

26. Private AI: Machine Learning on Encrypted Data

28. Homomorphic Encryption Standard

30. Modular invariants for genus 3 hyperelliptic curves

31. Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

32. Ramanujan graphs in cryptography

33. Attacks on the Search-RLWE problem with small errors

34. Security considerations for Galois non-dual RLWE families

36. Quantum resource estimates for computing elliptic curve discrete logarithms

37. Variations of the McEliece Cryptosystem

38. Ramanujan Graphs in Cryptography

40. A bound on the primes of bad reduction for CM curves of genus 3

41. Constructing genus 3 hyperelliptic Jacobians with CM

42. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

43. Variations of the McEliece Cryptosystem

44. Ring-LWE Cryptography for the Number Theorist

45. Provably weak instances of Ring-LWE

46. Crypto-Nets: Neural Networks over Encrypted Data

49. Bad reduction of genus $3$ curves with complex multiplication

50. On the quaternion $\ell$-isogeny path problem

Catalog

Books, media, physical & digital resources