Kristin Lauter

Results: 18



#Item
1Efficient arithmetic on Jacobians of genus 2 curves Craig Costello Microsoft Research Joint work with Joppe Bos, Huseyin Hisil and Kristin Lauter January 12, 2013

Efficient arithmetic on Jacobians of genus 2 curves Craig Costello Microsoft Research Joint work with Joppe Bos, Huseyin Hisil and Kristin Lauter January 12, 2013

Add to Reading List

Source URL: www.craigcostello.com.au

Language: English - Date: 2013-01-12 14:14:51
    2Fast Cryptography in Genus 2  Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece

    Fast Cryptography in Genus 2 Joppe W. Bos, Craig Costello, Huseyin Hisil and Kristin Lauter EUROCRYPT 2013 Athens, Greece

    Add to Reading List

    Source URL: www.craigcostello.com.au

    Language: English - Date: 2013-05-28 04:43:53
      3Submitted exclusively to the London Mathematical Society doi:On the quaternion `-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol Abstract

      Submitted exclusively to the London Mathematical Society doi:On the quaternion `-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol Abstract

      Add to Reading List

      Source URL: iml.univ-mrs.fr

      Language: English - Date: 2014-09-09 05:50:42
        4Submitted exclusively to the London Mathematical Society doi:On the quaternion `-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol Abstract

        Submitted exclusively to the London Mathematical Society doi:On the quaternion `-isogeny path problem David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol Abstract

        Add to Reading List

        Source URL: david.kohel.perso.luminy.univ-amu.fr

        Language: English - Date: 2014-09-09 05:50:42
          5Secure Cloud Computing for Medical Data Daniel J. Bernstein, Carl Ellison, Tanja Lange, Kristin Lauter, Victor Miller, Michael Naehrig, and Eran Tromer Abstract. We answer a recent challenge by Benaloh, Lauter, Horvitz,

          Secure Cloud Computing for Medical Data Daniel J. Bernstein, Carl Ellison, Tanja Lange, Kristin Lauter, Victor Miller, Michael Naehrig, and Eran Tromer Abstract. We answer a recent challenge by Benaloh, Lauter, Horvitz,

          Add to Reading List

          Source URL: www.anagram.com

          - Date: 2011-11-17 03:16:14
            6IMPROVED CRT ALGORITHM FOR CLASS POLYNOMIALS IN GENUS 2 KRISTIN E. LAUTER AND DAMIEN ROBERT Abstract. We present a generalization to genus 2 of the probabilistic algorithm of Sutherland for computing Hilbert class polyno

            IMPROVED CRT ALGORITHM FOR CLASS POLYNOMIALS IN GENUS 2 KRISTIN E. LAUTER AND DAMIEN ROBERT Abstract. We present a generalization to genus 2 of the probabilistic algorithm of Sutherland for computing Hilbert class polyno

            Add to Reading List

            Source URL: www.normalesup.org

            - Date: 2013-11-15 16:58:00
              7On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

              On a generalized Gross-Zagier formula and applications to genus 2 curves in cryptography Kristin Lauter, Microsoft Research Joint work with: Bianca Viray, Brown University

              Add to Reading List

              Source URL: www.cosic.esat.kuleuven.be

              - Date: 2013-09-19 10:39:02
                8Fast Cryptography in Genus 2 Joppe W. Bos Joint work with Craig Costello, Huseyin Hisil, Kristin Lauter

                Fast Cryptography in Genus 2 Joppe W. Bos Joint work with Craig Costello, Huseyin Hisil, Kristin Lauter

                Add to Reading List

                Source URL: www.cosic.esat.kuleuven.be

                - Date: 2013-09-19 10:38:53
                  9Weaknesses in Ring-LWE joint with (Yara Elias, Kristin E. Lauter, and Ekin Ozman) and (Hao Chen and Kristin E. Lauter)

                  Weaknesses in Ring-LWE joint with (Yara Elias, Kristin E. Lauter, and Ekin Ozman) and (Hao Chen and Kristin E. Lauter)

                  Add to Reading List

                  Source URL: math.colorado.edu

                  - Date: 2016-04-13 17:47:48
                    10Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

                    Vulnerable Galois RLWE Families and Improved Attacks Hao Chen, Kristin E. Lauter, Katherine E. Stange 1. Introduction Lattice-based cryptography was introduced in the mid 1990s in two different forms, independently by Aj

                    Add to Reading List

                    Source URL: math.colorado.edu

                    Language: English - Date: 2016-02-24 10:14:48