Search Results - "Lauter, Kristin"

Refine Results
  1. 1

    Secure human action recognition by encrypted neural network inference by Kim, Miran, Jiang, Xiaoqian, Lauter, Kristin, Ismayilzada, Elkhan, Shams, Shayan

    Published in Nature communications (15-08-2022)
    “…Advanced computer vision technology can provide near real-time home monitoring to support “aging in place” by detecting falls and symptoms related to seizures…”
    Get full text
    Journal Article
  2. 2

    HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS by Wang, Shuang, Zhang, Yuchen, Dai, Wenrui, Lauter, Kristin, Kim, Miran, Tang, Yuzhe, Xiong, Hongkai, Jiang, Xiaoqian

    Published in Bioinformatics (Oxford, England) (15-01-2016)
    “…Genome-wide association studies (GWAS) have been widely used in discovering the association between genotypes and phenotypes. Human genome data contain…”
    Get full text
    Journal Article
  3. 3

    Logistic regression over encrypted data from fully homomorphic encryption by Chen, Hao, Gilad-Bachrach, Ran, Han, Kyoohyung, Huang, Zhicong, Jalali, Amir, Laine, Kim, Lauter, Kristin

    Published in BMC medical genomics (11-10-2018)
    “…Background One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic…”
    Get full text
    Journal Article
  4. 4

    Modular polynomials via isogeny volcanoes by BRÖKER, REINIER, LAUTER, KRISTIN, SUTHERLAND, ANDREW V.

    Published in Mathematics of computation (01-04-2012)
    “…We present a new algorithm to compute the classical modular polynomial Φ l in the rings Z[X, Y] and (Z/mZ)[X, Y], for a prime l and any positive integer m. Our…”
    Get full text
    Journal Article
  5. 5

    Cryptographic Hash Functions from Expander Graphs by Charles, Denis X., Lauter, Kristin E., Goren, Eyal Z.

    Published in Journal of cryptology (01-01-2009)
    “…We propose constructing provable collision resistant hash functions from expander graphs in which finding cycles is hard. As examples, we investigate two…”
    Get full text
    Journal Article
  6. 6

    Shorter quantum circuits via single-qubit gate approximation by Kliuchnikov, Vadym, Lauter, Kristin, Minko, Romy, Paetznick, Adam, Petit, Christophe

    Published in Quantum (Vienna, Austria) (18-12-2023)
    “…We give a novel procedure for approximating general single-qubit unitaries from a finite universal gate set by reducing the problem to a novel magnitude…”
    Get full text
    Journal Article
  7. 7

    AN ARITHMETIC INTERSECTION FORMULA FOR DENOMINATORS OF IGUSA CLASS POLYNOMIALS by Lauter, Kristin, Viray, Bianca

    Published in American journal of mathematics (01-04-2015)
    “…In this paper we prove an explicit formula for the arithmetic intersection number (CM(K).Gl)ℓ on the Siegel moduli space of abelian surfaces, generalizing the…”
    Get full text
    Journal Article
  8. 8
  9. 9

    PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension by Chen, Feng, Wang, Chenghong, Dai, Wenrui, Jiang, Xiaoqian, Mohammed, Noman, Al Aziz, Md Momin, Sadat, Md Nazmus, Sahinalp, Cenk, Lauter, Kristin, Wang, Shuang

    Published in BMC medical genomics (26-07-2017)
    “…Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However,…”
    Get full text
    Journal Article
  10. 10

    Private queries on encrypted genomic data by Çetin, Gizem S, Chen, Hao, Laine, Kim, Lauter, Kristin, Rindal, Peter, Xia, Yuhou

    Published in BMC medical genomics (26-07-2017)
    “…One of the tasks in the iDASH Secure Genome Analysis Competition in 2016 was to demonstrate the feasibility of privacy-preserving queries on homomorphically…”
    Get full text
    Journal Article
  11. 11

    Evaluating Igusa functions by BRÖKER, REINIER, LAUTER, KRISTIN

    Published in Mathematics of computation (01-11-2014)
    “…parametrized by three Igusa functions. In this article we investigate a new way to evaluate these functions by using the Siegel Eisenstein series. We explain…”
    Get full text
    Journal Article
  12. 12

    Protecting genomic data analytics in the cloud: state of the art and opportunities by Tang, Haixu, Jiang, Xiaoqian, Wang, Xiaofeng, Wang, Shuang, Sofia, Heidi, Fox, Dov, Lauter, Kristin, Malin, Bradley, Telenti, Amalio, Xiong, Li, Ohno-Machado, Lucila

    Published in BMC medical genomics (13-10-2016)
    “…The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation…”
    Get full text
    Journal Article
  13. 13
  14. 14

    Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves by Boneh, Dan, Glass, Darren, Krashen, Daniel, Lauter, Kristin, Sharif, Shahed, Silverberg, Alice, Tibouchi, Mehdi, Zhandry, Mark

    Published in Journal of mathematical cryptology (01-01-2020)
    “…We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for parties for any ≥ 2. Our approach is based on the…”
    Get full text
    Journal Article
  15. 15

    Time-memory trade-offs for index calculus in genus 3 by Laine Kim, Lauter Kristin

    Published in Journal of mathematical cryptology (01-06-2015)
    “…In this paper, we present a variant of Diem's O˜(q)${\widetilde{O}(q)}$ index calculus algorithm to attack the discrete logarithm problem (DLP) in Jacobians of…”
    Get full text
    Journal Article
  16. 16

    Modular invariants for genus 3 hyperelliptic curves by Ionica, Sorina, Kılıçer, Pınar, Lauter, Kristin, Lorenzo García, Elisa, Mânzăţeanu, Adelina, Massierer, Maike, Vincent, Christelle

    Published in Research in number theory (01-03-2019)
    “…In this article we prove an analogue of a theorem of Lachaud, Ritzenthaler, and Zykin, which allows us to connect invariants of binary octics to Siegel modular…”
    Get full text
    Journal Article
  17. 17

    Computing genus 2 curves from invariants on the Hilbert moduli space by Lauter, Kristin, Yang, Tonghai

    Published in Journal of number theory (01-05-2011)
    “…We give a new method for generating genus 2 curves over a finite field with a given number of points on the Jacobian of the curve. We define two new invariants…”
    Get full text
    Journal Article
  18. 18
  19. 19

    Private genome analysis through homomorphic encryption by Kim, Miran, Lauter, Kristin

    “…The rapid development of genome sequencing technology allows researchers to access large genome datasets. However, outsourcing the data processing o the cloud…”
    Get full text
    Journal Article
  20. 20