# Kristin Lauter

Principal Researcher

Sign in to view more

Lauter was elected to the 2015 Class of Fellows of the American Mathematical Society “for contributions to arithmetic geometry and cryptography as well as service to the community.” In 2017, she was selected as a Fellow of the Association for Women in Mathematics in the inaugural class. She was selected as the Polya Lecturer for the Mathematical Association of America for 2018-2020. In 2008, Lauter and her coauthors were awarded the Selfridge Prize in Computational Number Theory.

## Papers150 papers

XONN: XNOR-based Oblivious Deep Neural Network Inference.

Supersingular Isogeny Graphs and Endomorphism Rings: Reductions and Solutions.

Secure Outsourced Matrix Computation and Application to Neural Networks.

Postquantum Cryptography, Part 2.

Manual for Using Homomorphic Encryption for Bioinformatics.

Private Queries on Encrypted Genomic Data.

Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms.

Private Collaborative Neural Network Learning.

Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs.

Constructing genus 3 hyperelliptic Jacobians with CM.

Secure Data Exchange: A Marketplace in the Cloud.

CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.

Variations of the McEliece Cryptosystem.

Homomorphic Computation of Edit Distance.

Key Recovery for LWE in Polynomial Time.

**1**|Bibtex

Hilbert theta series and invariants of genus 2 curves

Genus-2 curves and Jacobians with a given number of points

**9**|Bibtex

Time-Memory Trade-offs for Index Calculus in Genus 3.

Private predictive analysis on encrypted medical data.

User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store

**27**|Bibtex

Bad reduction of genus $3$ curves with complex multiplication

On the quaternion l-isogeny path problem

**2**|Bibtex

**63**|Bibtex

A Gross-Zagier formula for quaternion algebras over totally real fields.

High-Performance scalar multiplication using 8-dimensional GLV/GLS decomposition

Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.

High-Performance scalar multiplication using 8-dimensional GLV/GLS decomposition

Improved CRT Algorithm for Class Polynomials in Genus 2.

ML confidential: machine learning on encrypted data

Practical applications of homomorphic encryption

Modular polynomials via isogeny volcanoes.

An arithmetic intersection formula for denominators of Igusa class polynomials.

Anonymous Healthcare and Records System

**1**|Bibtex

On singular moduli for arbitrary discriminants

**12**|Bibtex

An Anonymous Health Care System.

Can homomorphic encryption be practical?

Computing genus 2 curves from invariants on the Hilbert moduli space

Attractive subfamilies of BLS curves for implementing high-security pairings

Group law computations on jacobians of hyperelliptic curves

Explicit CM-theory for level 2-structures on abelian surfaces

Attractive subfamilies of BLS curves for implementing high-security pairings

Abelian surfaces admitting an (l,l)-endomorphism

Attractive subfamilies of BLS curves for implementing high-security pairings

Group law computations on jacobians of hyperelliptic curves

An analysis of affine coordinates for pairing computation

Genus 2 Curves with Complex Multiplication

Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields

Secure Cloud Computing for Medical Data

Cryptographic Applications of Efficiently Evaluating Large Degree Isogenies

**1**|Bibtex

The distance between superspecial abelian varieties with real multiplication

Modular polynomials for genus 2

**17**|EI|Bibtex

Patient controlled encryption: ensuring privacy of electronic medical records

Computing Hilbert class polynomials

Full Cryptanalysis of LPS and Morgenstern Hash Functions

Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group

Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography

Stronger security of authenticated key exchange