Search Results - "Lauter, Kristin"
-
1
Secure human action recognition by encrypted neural network inference
Published in Nature communications (15-08-2022)“…Advanced computer vision technology can provide near real-time home monitoring to support “aging in place” by detecting falls and symptoms related to seizures…”
Get full text
Journal Article -
2
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
Published in Bioinformatics (Oxford, England) (15-01-2016)“…Genome-wide association studies (GWAS) have been widely used in discovering the association between genotypes and phenotypes. Human genome data contain…”
Get full text
Journal Article -
3
Logistic regression over encrypted data from fully homomorphic encryption
Published in BMC medical genomics (11-10-2018)“…Background One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic…”
Get full text
Journal Article -
4
Modular polynomials via isogeny volcanoes
Published in Mathematics of computation (01-04-2012)“…We present a new algorithm to compute the classical modular polynomial Φ l in the rings Z[X, Y] and (Z/mZ)[X, Y], for a prime l and any positive integer m. Our…”
Get full text
Journal Article -
5
Cryptographic Hash Functions from Expander Graphs
Published in Journal of cryptology (01-01-2009)“…We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two…”
Get full text
Journal Article -
6
Shorter quantum circuits via single-qubit gate approximation
Published in Quantum (Vienna, Austria) (18-12-2023)“…We give a novel procedure for approximating general single-qubit unitaries from a finite universal gate set by reducing the problem to a novel magnitude…”
Get full text
Journal Article -
7
AN ARITHMETIC INTERSECTION FORMULA FOR DENOMINATORS OF IGUSA CLASS POLYNOMIALS
Published in American journal of mathematics (01-04-2015)“…In this paper we prove an explicit formula for the arithmetic intersection number (CM(K).Gl)ℓ on the Siegel moduli space of abelian surfaces, generalizing the…”
Get full text
Journal Article -
8
Editor’s Preface for the Second Annual MathCrypt Proceedings Volume
Published in Journal of mathematical cryptology (01-01-2021)Get full text
Journal Article -
9
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Published in BMC medical genomics (26-07-2017)“…Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However,…”
Get full text
Journal Article -
10
Private queries on encrypted genomic data
Published in BMC medical genomics (26-07-2017)“…One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to demonstrate the feasibility of privacy-preserving queries on homomorphically…”
Get full text
Journal Article -
11
Evaluating Igusa functions
Published in Mathematics of computation (01-11-2014)“…parametrized by three Igusa functions. In this article we investigate a new way to evaluate these functions by using the Siegel Eisenstein series. We explain…”
Get full text
Journal Article -
12
Protecting genomic data analytics in the cloud: state of the art and opportunities
Published in BMC medical genomics (13-10-2016)“…The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation…”
Get full text
Journal Article -
13
Preface to the First Annual MathCrypt Proceedings Volume
Published in Journal of mathematical cryptology (01-01-2020)Get full text
Journal Article -
14
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
Published in Journal of mathematical cryptology (01-01-2020)“…We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for parties for any ≥ 2. Our approach is based on the…”
Get full text
Journal Article -
15
Time-memory trade-offs for index calculus in genus 3
Published in Journal of mathematical cryptology (01-06-2015)“…In this paper, we present a variant of Diem's O˜(q)${\widetilde{O}(q)}$ index calculus algorithm to attack the discrete logarithm problem (DLP) in Jacobians of…”
Get full text
Journal Article -
16
Modular invariants for genus 3 hyperelliptic curves
Published in Research in number theory (01-03-2019)“…In this article we prove an analogue of a theorem of Lachaud, Ritzenthaler, and Zykin, which allows us to connect invariants of binary octics to Siegel modular…”
Get full text
Journal Article -
17
Computing genus 2 curves from invariants on the Hilbert moduli space
Published in Journal of number theory (01-05-2011)“…We give a new method for generating genus 2 curves over a finite field with a given number of points on the Jacobian of the curve. We define two new invariants…”
Get full text
Journal Article -
18
Trading Inversions for Multiplications in Elliptic Curve Cryptography
Published in Designs, codes, and cryptography (01-05-2006)Get full text
Journal Article -
19
Private genome analysis through homomorphic encryption
Published in BMC medical informatics and decision making (21-12-2015)“…The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud…”
Get full text
Journal Article -
20
Class invariants for quartic CM fields
Published in Annales de l'Institut Fourier (2007)Get full text
Journal Article