Volgen
Kristin E. Lauter
Kristin E. Lauter
Director of Research Science, North American Labs, Meta AI Research
Geverifieerd e-mailadres voor meta.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Cryptographic cloud storage
S Kamara, K Lauter
Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010
19782010
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy
R Gilad-Bachrach, N Dowlin, K Laine, K Lauter, M Naehrig, J Wernsing
International conference on machine learning, 201-210, 2016
15592016
Can homomorphic encryption be practical?
M Naehrig, K Lauter, V Vaikuntanathan
Proceedings of the 3rd ACM workshop on Cloud computing security workshop …, 2011
13512011
Stronger security of authenticated key exchange
B LaMacchia, K Lauter, A Mityagin
Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007
7972007
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
6452009
The advantages of elliptic curve cryptography for wireless security
K Lauter
IEEE Wireless communications 11 (1), 62-67, 2004
5792004
ML confidential: Machine learning on encrypted data
T Graepel, K Lauter, M Naehrig
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
5572013
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
5212013
Cryptographic hash functions from expander graphs
DX Charles, KE Lauter, EZ Goren
Journal of CRYPTOLOGY 22 (1), 93-113, 2009
4352009
Signatures for network coding
D Charles, K Jain, K Lauter
2006 40th Annual Conference on Information Sciences and Systems, 857-863, 2006
3282006
Private predictive analysis on encrypted medical data
JW Bos, K Lauter, M Naehrig
Journal of biomedical informatics 50, 234-243, 2014
3002014
XONN: XNOR-based Oblivious Deep Neural Network Inference.
MS Riazi, M Samragh, H Chen, K Laine, KE Lauter, F Koushanfar
USENIX Security Symposium, 1501-1518, 2019
2432019
Trading inversions for multiplications in elliptic curve cryptography
M Ciet, M Joye, K Lauter, PL Montgomery
Designs, codes and cryptography 39, 189-206, 2006
2422006
Homomorphic encryption security standard
M Albrecht, M Chase, H Chen, J Ding, S Goldwasser, S Gorbunov, ...
HomomorphicEncryption. org, Toronto, Canada, Tech. Rep 11, 2018
2162018
Secure outsourced matrix computation and application to neural networks
X Jiang, M Kim, K Lauter, Y Song
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2142018
Private computation on encrypted genomic data
K Lauter, A López-Alt, M Naehrig
Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015
2132015
Quantum resource estimates for computing elliptic curve discrete logarithms
M Roetteler, M Naehrig, KM Svore, K Lauter
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
1982017
Privately evaluating decision trees and random forests
DJ Wu, T Feng, M Naehrig, K Lauter
Cryptology ePrint Archive, 2015
1752015
Crypto-nets: Neural networks over encrypted data
P Xie, M Bilenko, T Finley, R Gilad-Bachrach, K Lauter, M Naehrig
arXiv preprint arXiv:1412.6181, 2014
1732014
CHET: an optimizing compiler for fully-homomorphic neural-network inferencing
R Dathathri, O Saarikivi, H Chen, K Laine, K Lauter, S Maleki, ...
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019
1662019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20