Kristin E. Lauter
Kristin E. Lauter
Principal Researcher, Manager, Cryptography Research Group, Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Cryptographic cloud storage
S Kamara, K Lauter
International Conference on Financial Cryptography and Data Security, 136-149, 2010
17542010
Can homomorphic encryption be practical?
M Naehrig, K Lauter, V Vaikuntanathan
Proceedings of the 3rd ACM workshop on Cloud computing security workshop …, 2011
10602011
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy
R Gilad-Bachrach, N Dowlin, K Laine, K Lauter, M Naehrig, J Wernsing
International Conference on Machine Learning, 201-210, 2016
7082016
Stronger security of authenticated key exchange
B LaMacchia, K Lauter, A Mityagin
International conference on provable security, 1-16, 2007
6602007
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
5532009
The advantages of elliptic curve cryptography for wireless security
K Lauter
IEEE Wireless communications 11 (1), 62-67, 2004
4972004
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
IMA International Conference on Cryptography and Coding, 45-64, 2013
3962013
ML confidential: Machine learning on encrypted data
T Graepel, K Lauter, M Naehrig
International Conference on Information Security and Cryptology, 1-21, 2012
3752012
Signatures for network coding
D Charles, K Jain, K Lauter
2006 40th Annual Conference on Information Sciences and Systems, 857-863, 2006
2832006
Cryptographic hash functions from expander graphs
DX Charles, KE Lauter, EZ Goren
Journal of Cryptology 22 (1), 93-113, 2009
2632009
Private predictive analysis on encrypted medical data
JW Bos, K Lauter, M Naehrig
Journal of biomedical informatics 50, 234-243, 2014
2282014
Trading inversions for multiplications in elliptic curve cryptography
M Ciet, M Joye, K Lauter, PL Montgomery
Designs, codes and cryptography 39 (2), 189-206, 2006
2182006
Private computation on encrypted genomic data
K Lauter, A López-Alt, M Naehrig
International Conference on Cryptology and Information Security in Latin …, 2014
1692014
Fast elliptic curve arithmetic and improved Weil pairing evaluation
K Eisenträger, K Lauter, PL Montgomery
Cryptographers’ Track at the RSA Conference, 343-354, 2003
1312003
Homomorphic computation of edit distance
JH Cheon, M Kim, K Lauter
International Conference on Financial Cryptography and Data Security, 194-212, 2015
1232015
Security analysis of KEA authenticated key exchange protocol
K Lauter, A Mityagin
International Workshop on Public Key Cryptography, 378-394, 2006
1062006
Private genome analysis through homomorphic encryption
M Kim, K Lauter
BMC medical informatics and decision making 15 (S5), S3, 2015
962015
Privately evaluating decision trees and random forests
DJ Wu, T Feng, M Naehrig, K Lauter
Proceedings on Privacy Enhancing Technologies 2016 (4), 335-355, 2016
952016
Crypto-nets: Neural networks over encrypted data
P Xie, M Bilenko, T Finley, R Gilad-Bachrach, K Lauter, M Naehrig
arXiv preprint arXiv:1412.6181, 2014
912014
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X Jiang
Bioinformatics 32 (2), 211-218, 2016
842016
The system can't perform the operation now. Try again later.
Articles 1–20