Kristin Lauter is a Principal Researcher and Research Manager for the Cryptography and Privacy Research group at Microsoft Research.  Her research areas are number theory and algebraic geometry, with applications to cryptography. She is particularly known for her work on homomorphic encryption, elliptic curve cryptography, and for introducing supersingular isogeny graphs as a hard problem into cryptography.  She served as President of the Association for Women in Mathematics from 2015 –2017.

Lauter was elected to the 2015 Class of Fellows of the American Mathematical Society “for contributions to arithmetic geometry and cryptography as well as service to the community.”  In 2017, she was selected as a Fellow of the Association for Women in Mathematics in the inaugural class. She was selected as the Polya Lecturer for the Mathematical Association of America for 2018-2020.  In 2008, Lauter and her coauthors were awarded the Selfridge Prize in Computational Number Theory.

She is a co-founder of the Women in Numbers Network, a research collaboration community for women in number theory, and she is the lead PI for the AWM NSF Advance Grant (2015-2020) to create and sustain research networks for women in all areas of mathematics.  She is the Series Editor for the AWM Springer Series. She serves on the Advisory Board[6] of the Banff International Research Station, the Board of Trustees of MSRI, and has served on the Council[7] of the American Mathematical Society (2014-2017).

Lauter received her BA, MS, and Ph.D degrees in mathematics from the University of Chicago, in 1990, 1991, and 1996, respectively. Prior to joining Microsoft, she held positions as a Visiting Scholar at Max Planck Institut fur Mathematik in Bonn, Germany (1997), T.H. Hildebrandt Research Assistant Professor at the University of Michigan (1996-1999), and a Visiting Researcher at Institut de Mathematiques Luminy in France (1999).

CV: Kristin Lauter Curriculum Vitae2016.





by Google Scholar


Progress in Cryptology — LATINCRYPT 2015, 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015. Lecture Notes in Computer Science 9230, Springer. Co-edited with Francisco Rodriguez-Henriquez.

Selected Areas in Cryptography 2013, Lecture Notes in Computer Science, Springer 2014. Co-edited with Tanja Lange and Petr Lisonek.

WIN–Women in Numbers: Research Directions in Number Theory, Fields Institute Communications Series, Volume 60 (2011). Co-edited with Alina-Carmen Cojocaru, Rachel Pries, Renate Scheidler.

Computational Arithmetic Geometry. AMS Contemporary Mathematics Series, volume 463 (2008). Co-edited with Ken Ribet.

Topics in Algebraic and Noncommutative Geometry, Proceedings of the Conferences in memory of Ruth Michler. AMS Contemporary Mathematics Series, volume 324 (2003) . Co-edited with Caroline Grant Melles, Jean-Paul Brasselet, Gary Kennedy, Lee McEwan.

Articles by area



  • 2015/971 ( PDF ) Attacks on Search RLWE Hao Chen, Kristin Lauter, and Katherine E. Stange
  • 2015/965 ( PDF ) Private Genome Analysis through Homomorphic Encryption Miran Kim and Kristin Lauter,  BioMed Central, Journal of Medical Informatics and Decision Making
  • 2015/758 ( PDF ) Ring-LWE Cryptography for the Number Theorist Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange, Proceedings of WIN3
  • 2015/386 ( PDF ) Privately Evaluating Decision Trees and Random Forests David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
  • 2015/176 ( PDF ) Key Recovery for LWE in Polynomial Time Kim Laine and Kristin Lauter
  • 2015/133 ( PDF ) Private Computation on Encrypted Genomic Data Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig, LatinCrypt 2014 (GenoPri 2014).
  • 2015/132 ( PDF ) Homomorphic Computation of Edit Distance Jung Hee Cheon and Miran Kim and Kristin Lauter, Workshop on Applied Homomorphic Cryptography 2015
  • 2015/106 ( PDF ) Provably weak instances of Ring-LWE Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange, CRYPTO 2015
  • 10.1093/bioinformatics/btv563 HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. BioinformaticsShuang Wang, Yuchen Zhang, Wenrui Dai, Kristin Lauter, Miran Kim, Yuzhe Tang, Hongkai Xiong, Xiaoquian Jiang.


Arithmetic geometry

Cryptographic implementation improvements

Algorithmic number theory

Number of points on curves over finite fields

  • Genus-2 curves and Jacobians with a given number of points. LMS Journal of Computation and Mathematics, With Reinier Bröker, Everett W. Howe, Peter Stevenhagen. http://arxiv.org/pdf/1403.6911.pdf
  • New methods for bounding the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter, in Geometry and Arithmetic, Editors: C. Faber, G.Farkas, R. de Jong, European Mathematical Society 2012, pp. 173–212.
  • Pointless curves of genus 3 and 4, by Everett W. Howe, Kristin E. Lauter, Jaap Top, in Arithmetic, geometry and coding theory, Yves Aubry – Gilles Lachaud (Éd.) Séminaires et Congrès 11 (2005), xviii+216 pages, pp. 125–141.
  • Improved upper bounds for the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter, Annales de l’Institut Fourier, volume 53, 6(2003), 1677–1737.
  • The maximum number of points on a curve of genus 4 over F8 is 25, by David Savitt, with an Appendix by K. Lauter, Canad. J. Math., 55 (2003), 331–352.
  • The maximum or minimum number of rational points on genus three curves over finite fields, by Kristin Lauter with an Appendix by J-P. Serre, Compositio Math. 134 (2002) 87–111.
  • Geometric methods for improving the upper bounds on the number of rational points on algebraic curves over finite fields. Lauter, Kristin, with an appendix in French by J.-P. Serre. J. Algebraic Geom. 10 (2001), no. 1, 19–36.
  • Zeta functions of curves over finite fields with many rational points. Kristin Lauter, Coding theory, cryptography and related areas (Guanajuato, 1998), 167–174, Springer, Berlin, 2000.
  • Non-existence of a curve over F3 of genus 5 with 14 rational points. Kristin Lauter, Proc. Amer. Math. Soc. 128 (2000), no. 2, 369–374. MR 1664414.Abstract, references, and article information View Article: PDF
  • Improved upper bounds for the number of rational points on algebraic curves over finite fields. Kristin Lauter, C. R. Acad. Sci. Paris Sér. I Math. 328 (1999), no. 12, 1181–1185.
  • A Formula for Constructing Curves over Finite Fields with Many Rational Points Kristin Lauter, Journal of Number Theory, Volume 74, Issue 1, January 1999, Pages 56-72.
  • Deligne-Lusztig curves as ray class fields. Kristin Lauter, Manuscripta Math. 98 (1999), no. 1, 87–96.
  • Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points, K. Lauter, Algorithmic Number Theory Symposium (ed. by H. Cohen), Lecture Notes in Computer Science 1122, 187-195 Springer, Berlin 1996.

Talks and conferences

Invited talks

Selected past invited talks

Older talks…to be completed:

ANTS II: Algorithmic Number Theory Symposium, Universite de Bordeaux, May 20, 1996.

Oberwolfach Meeting on Finite Fields, Oberwolfach, Germany, January 20, 1997.

Connecticut Valley Undergraduate Colloquium Series, UMass, Amherst, April 23, 1997.

AGCT-6: Arithmetic, Geometry, and Coding Theory, C.I.R.M. Luminy, France, June 24, 1997.

AMS Summer Research Conference, Applications of Curves over Finite Fields, Seattle, 1997.

European Research Conference, Number Theory and Arithmetical Geometry, Spain, Oct 1997.

ICCC: 2nd International Conference on Coding Theory and Cryptography, Mexico, April, 1998.

AMS Fall Western Section Meeting, Tucson, Arizona, November 14-15, 1998

Oberwolfach Meeting on Explicit Methods in Number Theory, Oberwolfach, July, 1999.

AGCT-7: Arithmetic, Geometry, and Coding Theory, October, 1999, C.I.R.M., Luminy, France

Workshop on Unusual Applications of Number Theory, 10-14 January 2000, DIMACS

AMS Western Section Regional Meeting, Invited Address, October, 2000, San Francisco

MSRI Workshop on Number Theory, Genus three curves over finite fields October, 2000

Sixth Pacific North West Number Theory Conference Vancouver, March 2002.

IPAM New Trends in Cryptography, April 2002

University of Michigan Undergraduate Colloquium, April 2002

High Primes and Misdemeanours, Lectures in honour of Hugh Williams, Banff 2003

Pacific Northwest Number Theory Conference, Vancouver, April 2004

BIRS Workshop: Explicit Methods in Number Theory, November, 2004

BIRS Workshop Number Theory Inspired by Cryptography November, 2005.

Steering committees

Program co-chair

Conferences co-organized

Program committees

In The News

Homomorphic encryption

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data | CardRates | January 31, 2019

From the NSA to Silicon Valley, a new kind of encryption is going commercial | cyberscoop | January 22, 2019

Intel, Microsoft Push Homomorphic Encryption with Open-Source Moves | Toolbox | January 10, 2019

Microsoft Open Sources Homomorphic Encryption Library “SEAL” | Computer Business Review | January 2, 2019

SEAL up your data just like Microsoft: Redmond open-sources ‘simple’ homomorphic encryption blueprints | The Register | December 4, 2018

Microsoft open sources (SEAL) Simple Encrypted Arithmetic Library 3.1.0, with aims to standardize homomorphic encryption | Packt | December 4, 2018

Microsoft Open Sources SEAL Homomorphic Encryption Library | Decipher | December 3, 2018

Microsoft SEAL Arrives as Simple and Efficient Homomorphic Encryption Solution | WinBuzzer | December 3, 2018

HE-Transformer for nGraph: Enabling Deep Learning on Encrypted Data | Intel AI | December 3, 2018

The Future of Cryptography | Queen Elizabeth Prize for Engineering | August 2018

Microsoft researchers smash homomorphic encryption speed barrierThe Register | February 2016

Microsoft boffins build better crypto for secure medical data crunchingThe Register | November 2015

Microsoft helps out healthcare sector with new data encryption algorithmSoftPedia News | November 2015

Core Concept: Homomorphic encryption PNAS | July 2015

How Apple, Google, and Microsoft approach genetic research and secure DNA data in the cloudSPLINTER | May 2015

Kristin Lauter on cryptography and mathematicsXRDS/ACM Crossroads | March 2015

Cryptographer’s challenge: Keeping genetic secrets while advancing genetic researchMicrosoft Research Blog | March 2015

New Community Challenge Seeks to Evaluate Methods of Computing on Encrypted Genomic Datagenome web | November 2014

Genomic privacy

A Cipher for Your Genome | GeneWatch | January – April 2014

How to Hide Your Genome | Science News | February 2014

Your Genome: to share or not to share | AAAS News | February 2014

AAAS Newsroom Panel: Live demo (minutes 12-15) | EurekAlert! | February 2014

Keep Your Genetic Data Secure | PlanetSave | February 2014

Big Data, Big Changes | Perfectly Awkward Science | May 2014

Cryptographic hash functions

Science | Dana Mackenzie | March 2008

Math in the Media | AMS | March 2008

Cryptographic cloud storage

Searching an Encrypted Cloud | David Talbot of Technology Review | December 2009

Video Interview: The Cryptographic Solution | David Talbot of Technology Review | December 2009

Security in the Ether | David Talbot of Technology Review | December 2009

Considerations for the Cryptographic Cloud | HPC in the Cloud | 2010

Security in the Cloud | Communications of the ACM | November 2010

Practical somewhat homomorphic encryption

Alice and Bob in Cipherspace | Brian Hayes of American Scientist | September 2012

A Cloud that Can’t Leak | Tom Simonite of Technology Review | August 2011

Mehr Sicherheit für Datenwolke | Tom Simonite, Niels Boeing of Technology Review | August 2011

ACM Technews, Twitter posts, Business Week, Orange Business blogs, CloudAve

Women in math

It All Adds Up! Celebration of 150 Years of Women in Mathematics | +plus Magazine | May 26, 2015

First Woman Fields Medalist | UPI | August 2014

AWM President Elect | AWM Newsletter  | March 2014

Conference in Honor of Winnie LiLSU Communications and Media RelationsInterview on Channel 9 WAFB | April 2014

PhD+epsilon | Conference diaries: Women in Numbers | Europe AMS | October 30, 2013

PhD+epsilon | Sage Days 50 – Women in Sage | AMS | July 2013

PhD+Epsilon | Women In SAGE 3 | AMS | July 2012

AWM-Microsoft Research Prize | AWM Newsletter | November 2012

WIN2 2011 Women In Numbers | Asian Pacific Mathematics Newsletter | January 2012

PhD+epsilon | AWM 40th Anniversary Conference | AMS blog | October 2011

WIN 2008 Women In Numbers Conference | Fields Institute Newsletter | January 2009

Other News

First Woman Ever Wins Math’s ‘Nobel Prize’ | UPI | August 2014

Microsoft Research’s Lauter Named Next AWM President | Microsoft Research Blog | January 2014

Alice and Bob in Cipherspace | American Scientist | September – October 2012

Top Researchers Inspire Interns | Microsoft Research Blog | August 2011

A Cloud That Can’t Leak | MIT Technology Review | August 2011

Security in the Cloud | Communications of the ACM | November 2010

Searching an Encrypted Cloud | MIT Technology Review | November 2009

Français du Canada English