Volgen
Michael Naehrig
Michael Naehrig
Principal Researcher, Microsoft Research, USA
Geverifieerd e-mailadres voor cryptojedi.org - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy
R Gilad-Bachrach, N Dowlin, K Laine, K Lauter, M Naehrig, J Wernsing
International conference on machine learning, 201-210, 2016
15712016
Can homomorphic encryption be practical?
M Naehrig, K Lauter, V Vaikuntanathan
Proceedings of the 3rd ACM workshop on Cloud computing security workshop …, 2011
13572011
Pairing-friendly elliptic curves of prime order
PSLM Barreto, M Naehrig
Selected Areas in Cryptography: 12th International Workshop, SAC 2005 …, 2006
12172006
ML confidential: Machine learning on encrypted data
T Graepel, K Lauter, M Naehrig
Information Security and Cryptology–ICISC 2012: 15th International …, 2013
5572013
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
5222013
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
2015 IEEE Symposium on Security and Privacy, 553-570, 2015
4362015
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
4312016
Efficient algorithms for supersingular isogeny Diffie-Hellman
C Costello, P Longa, M Naehrig
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
3352016
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
3322014
Private predictive analysis on encrypted medical data
JW Bos, K Lauter, M Naehrig
Journal of biomedical informatics 50, 234-243, 2014
3042014
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
2622015
A Comparison of the Homomorphic Encryption Schemes FV and YASHE
T Lepoint, M Naehrig
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
2372014
Private computation on encrypted genomic data
K Lauter, A López-Alt, M Naehrig
Progress in Cryptology-LATINCRYPT 2014: Third International Conference on …, 2015
2172015
Speeding up the number theoretic transform for faster ideal lattice-based cryptography
P Longa, M Naehrig
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
2102016
Quantum resource estimates for computing elliptic curve discrete logarithms
M Roetteler, M Naehrig, KM Svore, K Lauter
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
1922017
Privately evaluating decision trees and random forests
DJ Wu, T Feng, M Naehrig, K Lauter
Cryptology ePrint Archive, 2015
1762015
Crypto-nets: Neural networks over encrypted data
P Xie, M Bilenko, T Finley, R Gilad-Bachrach, K Lauter, M Naehrig
arXiv preprint arXiv:1412.6181, 2014
1732014
Efficient compression of SIDH public keys
C Costello, D Jao, P Longa, M Naehrig, J Renes, D Urbanik
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
1512017
Supersingular isogeny key encapsulation
D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ...
Submission to the NIST Post-Quantum Standardization Project, 2017
1502017
New software speed records for cryptographic pairings
M Naehrig, R Niederhagen, P Schwabe
Progress in Cryptology–LATINCRYPT 2010: First International Conference on …, 2010
1462010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20