## About

Kristin Lauter is a Principal Researcher and Research Manager for the Cryptography group at Microsoft Research. Her research areas are number theory and algebraic geometry, with applications to cryptography. She is particularly known for her work on homomorphic encryption, elliptic curve cryptography, and for introducing supersingular isogeny graphs as a hard problem into cryptography. She served as President of the Association for Women in Mathematics from 2015 –2017.

Lauter was elected to the 2015 Class of Fellows of the American Mathematical Society “for contributions to arithmetic geometry and cryptography as well as service to the community.” In 2017, she was selected as a Fellow of the Association for Women in Mathematics in the inaugural class. She was selected as the Polya Lecturer for the Mathematical Association of America for 2018-2020. In 2008, Lauter and her coauthors were awarded the Selfridge Prize in Computational Number Theory.

She is a co-founder of the Women in Numbers Network, a research collaboration community for women in number theory, and she is the lead PI for the AWM NSF Advance Grant (2015-2020) to create and sustain research networks for women in all areas of mathematics. She is the Series Editor for the AWM Springer Series. She serves on the Advisory Board[6] of the Banff International Research Station, the Board of Trustees of MSRI, and has served on the Council[7] of the American Mathematical Society (2014-2017).

Lauter received her BA, MS, and Ph.D degrees in mathematics from the University of Chicago, in 1990, 1991, and 1996, respectively. Prior to joining Microsoft, she held positions as a Visiting Scholar at Max Planck Institut fur Mathematik in Bonn, Germany (1997), T.H. Hildebrandt Research Assistant Professor at the University of Michigan (1996-1999), and a Visiting Researcher at Institut de Mathematiques Luminy in France (1999).

CV: Kristin Lauter Curriculum Vitae2016.

## Projects

## Videos

## Other

#### Books

Progress in Cryptology — LATINCRYPT 2015, 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015. Lecture Notes in Computer Science 9230, Springer. Co-edited with Francisco Rodriguez-Henriquez.

Selected Areas in Cryptography 2013, Lecture Notes in Computer Science, Springer 2014. Co-edited with Tanja Lange and Petr Lisonek.

WIN–Women in Numbers: Research Directions in Number Theory, Fields Institute Communications Series, Volume 60 (2011). Co-edited with Alina-Carmen Cojocaru, Rachel Pries, Renate Scheidler.

Computational Arithmetic Geometry. AMS Contemporary Mathematics Series, volume 463 (2008). Co-edited with Ken Ribet.

Topics in Algebraic and Noncommutative Geometry, Proceedings of the Conferences in memory of Ruth Michler. AMS Contemporary Mathematics Series, volume 324 (2003) . Co-edited with Caroline Grant Melles, Jean-Paul Brasselet, Gary Kennedy, Lee McEwan.

## Articles by area

#### Cryptography

2015

- 2015/971 ( PDF )
**Attacks on Search RLWE***Hao Chen, Kristin Lauter, and Katherine E. Stange* - 2015/965 ( PDF )
**Private Genome Analysis through Homomorphic Encryption***Miran Kim and Kristin Lauter,*BioMed Central, Journal of Medical Informatics and Decision Making - 2015/758 ( PDF )
**Ring-LWE Cryptography for the Number Theorist***Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange,*Proceedings of WIN3 - 2015/386 ( PDF )
**Privately Evaluating Decision Trees and Random Forests***David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter* - 2015/176 ( PDF )
**Key Recovery for LWE in Polynomial Time***Kim Laine and Kristin Lauter* - 2015/133 ( PDF )
**Private Computation on Encrypted Genomic Data***Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig,*LatinCrypt 2014 (GenoPri 2014). - 2015/132 ( PDF )
**Homomorphic Computation of Edit Distance***Jung Hee Cheon and Miran Kim and Kristin Lauter,*Workshop on Applied Homomorphic Cryptography 2015 - 2015/106 ( PDF )
**Provably weak instances of Ring-LWE***Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange,*CRYPTO 2015 - 10.1093/bioinformatics/btv563
**HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics**.*Shuang Wang, Yuchen Zhang, Wenrui Dai, Kristin Lauter, Miran Kim, Yuzhe Tang, Hongkai Xiong, Xiaoquian Jiang*.

Earlier

- Weak Instances of PLWE. In
**Selected Areas of Cryptography 2014,**Montreal, Canada. With Kirsten Eisentraeger, Sean Hallgren. http://eprint.iacr.org/2014/784.pdf - Time-Memory Trade-offs for Index Calculus in Genus 3.
**Journal of Mathematical Cryptology**, Volume 9, Issue 2. Pages 95-114, With Kim Laine. - Private Predictive Analysis on Encrypted Medical Data.
**Journal of Biomedical Informatics**, 2014. With Joppe W. Bos and Michael Naehrig. http://eprint.iacr.org/2014/336.pdf - Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme, in
**IMA CC 2013**, with Joppe W. Bos, Jake Loftus, and Michael Naehrig. http://eprint.iacr.org/2013/075.pdf **ML Confidential: Machine Learning on Encrypted Data***Thore Graepel, Kristin Lauter, Michael Naehrig*2012/323 ( PDF ),**ICISC**2012**, LNCS 7839**, pages 1-21. Springer, Heidelberg, 2013.- Can Homomorphic Encryption Be Practical? with Michael Naehrig, Vinod Vaikuntanathan, in
**CCSW 2011**, ACM Cloud Computing Security Workshop 2011. - An Anonymous Health Care System, by
**HealthSec**, 1st USENIX Workshop on Health Security and Privacy, 2010. 2011/016 (PDF) - Cryptographic Cloud Storage, with Seny Kamara, in Proceedings of Financial Cryptography
**FC 2010**: Workshop on Real-Life Cryptographic Protocols and Standardization. - Patient Controlled Encryption: patient privacy in electronic medical records, with Josh Benaloh, Melissa Chase, Eric Horvitz, in
**CCSW’09**ACM Cloud Computing Security Workshop. - Full Cryptanalysis of LPS and Morgenstern Hash Function, by Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater, in
**Security and Cryptography of Networks 2008** - The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences by Kristin E. Lauter and Katherine E. Stange, in
**Selected Areas in Cryptography 2008** - Stronger Security of Authenticated Key Exchange, by Brian LaMacchia, Kristin Lauter, Anton Mityagin, in
**ProvSec2007**, - Signatures for Network Coding, by Denis Charles, Kamal Jain, Kristin Lauter, Invited paper for
**CISS06****,**in Int. J. Information and Coding Theory (IJICoT) - Security Analysis of KEA Authenticated Key Exchange, by Kristin Lauter and Anton Mityagin, In
**PKC2006** - Cryptographic hash functions from expander graphs, by Denis Charles, Eyal Goren, Kristin Lauter,
**Second NIST Hash Function Workshop**, in Journal of Cryptology. - The Advantages of Elliptic Curve Cryptography for Wireless Security,
**IEEE Wireless Comm. Magazine**, February 2004

#### Arithmetic geometry

- Bad reduction of genus-3 curves with complex multiplication.
**Proceedings of WIN-Europe**, With Irene Bouw, Jenny Cooley, Elisa Lorenzo Garcia, Michelle Manes, Rachel Newton, Ekin Ozman. Association for Women in Mathematics Series, Volume 2, Springer pp. 109-151. http://arxiv.org/pdf/1407.3589.pdf - An arithmetic intersection formula for denominators of Igusa class polynomials, by Kristin Lauter, Bianca Viray,
**American Journal of Mathematics,**137 (2015), no. 2, 497–533. doi: 10.1353/ajm.2015.0010, arXiv:1210.7841, http://eprint.iacr.org/2012/614, - On singular moduli for arbitrary discriminants, by Kristin Lauter, Bianca Viray,
**International Mathematics Research Notices**, Volume 2015, Issue 19, pp. 9206-9250. arXiv:1206.6942

- Comparing arithmetic intersection formulas for denominators of Igusa class polynomials, arXiv:1211.0788. by J. Anderson, J. Balakrishnan, K. Lauter, J. Park, B. Viray.
**WIN2 Proceedings Volume**, AMS 2013, - A Gross-Zagier formula for quaternion algebras over totally real fields, by Eyal Z. Goren and Kristin E. Lauter, to appear in
**Algebra and Number Theory**. 2011/666 - Igusa class polynomials, embeddings of quartic CM fields, and arithmetic intersection theory, by Helen Grundman, Jennifer Johnson-Leung, Kristin Lauter, Adriana Salerno, Bianca Viray, Erika Wittenborn, in WIN–Women in Numbers: Research Directions in Number Theory,
**Fields Institute Communications Series**, Volume 60 (2011). arXiv:1006.0208 [pdf] - Genus 2 Curves with Complex Multiplication, Eyal Z. Goren and Kristin E. Lauter,
**Int Math Res Notices**, published online April 12, 2011 doi:10.1093/imrn/rnr052 2010/156 - Abelian surfaces admitting an (l,l)-endomorphism, by Reinier Broker, Kristin Lauter, Marco Streng, Preprint 2011. arXiv:1106.1884 [pdf],
**Journal of Algebra**394 (2013) 374–396. - The distance between superspecial abelian varieties with real multiplication, by Eyal Goren, Kristin Lauter,
**Journal of Number Theory**, Volume 129, Issue 6, June 2009, Pages 1562-1578 doi:10.1016/j.jnt.2008.07.005 - Explicit Heegner points: Kolyvagin’s conjecture and non-trivial elements in the Shafarevich–Tate group by Dimitar Jetchev, Kristin Lauter, William Stein,
**Journal of Number Theory**, Volume 129, Issue 2, February 2009, Pages 284-302 - Families of Ramanujan graphs and quaternion algebras, by Denis Charles, Eyal Goren, Kristin Lauter
*,*in**Groups and Symmetries: From Neolithic Scots to John McKay**, AMS/CRM, 2009. - Computing the Cassels pairing on Kolyvagin classes in the Shafarevich-Tate group, by Kirsten Eisentraeger, Dimitar Jetchev, Kristin Lauter, in
**Pairing 2008***.* - Evil Primes and Superspecial Moduli, by Eyal Goren, Kristin Lauter
*,***International Mathematics Research Notices,**volume 2006, Article ID 53864, pages 1–19. (http://arxiv.org/abs/math/0512472) - Class invariants of quartic CM fields,
**Annales de l’Institut Fourier**, Vol. 57 no. 2 (2007), p.457-480. (http://www.arxiv.org/math.NT/0404378) - Primes in the denominators of Igusa class polynomials, by Kristin Lauter. (http://www.arxiv.org/math.NT/0301240)

#### Cryptographic implementation improvements

- Two is Greater than One, by Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter.
**Eurocrypt 2013**, MSR-TR-2012-117, November 2012 - High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition,
**CHES 2013**, Lecture Notes in Computer Science, with Joppe W. Bos, Craig Costello, Huseyin Hisil. - Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings, by Craig Costello, Kristin Lauter, and Michael Naehrig, Progress in Cryptology –
**INDOCRYPT 2011**, Lecture Notes in Computer Science 7107, Springer-Verlag (2011), pp 320–342.2011/465 (PDF) - Group Law Computations on Jacobians of Hyperelliptic Curves, by Craig Costello and Kristin Lauter, in Selected Areas in Cryptography
**SAC 2011**, Lecture Notes in Computer Science Volume 7118, Springer-Verlag (2012), pp 92-117. 2011/306 (PDF) - Affine Pairings on ARM, Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow, In
*Pairing-Based Cryptography –***Pairing 2012**. 2011/243 - An Analysis of Affine Coordinates for Pairing Computation, by Kristin Lauter, Peter L. Montgomery, Michael Naehrig, Pairing-Based Cryptography –
**Pairing 2010**, Lecture Notes in Computer Science 6487, Springer-Verlag (2010), pp 1–20. - Improved Weil and Tate pairings for elliptic and hyperelliptic curves,
*by K. Eisentraeger, K. Lauter, P.L. Montgomery*,**In: Algorithmic Number Theory – ANTS-VI**, Buell (Ed.), LNCS 3076, 169–183. Published version. http://www.arxiv.org/ math.NT/0311391 - Trading Inversions for Multiplications in Elliptic Curve Cryptography, by Mathieu Ciet, Marc Joye, Kristin Lauter and Peter L. Montgomery, In
**Designs, Codes, and Cryptography**. Published version. http://eprint.iacr.org/2003/257/ - Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation, by K. Eisentraeger, K. Lauter, P.L. Montgomery,
**In: Topics in Cryptology – CT-RSA 2003**, M. Joye (Ed.): LNCS 2612, 343-354, Springer, Berlin 2003. - The equivalence of the geometric and algebraic group laws for Jacobians of genus 2 curves, by K. Lauter,
**Topics in Algebraic and Noncommutative Geometry**, AMS Contemporary Mathematics Series 324 (2003) 165–171.

#### Algorithmic number theory

- Denominators of Igusa class polynomials, by Kristin Lauter; Bianca Viray,
**Publications mathématiques de Besançon**no. 2 (2014), p. 5-29 Détail - Hilbert theta series and invariants of genus 2 curves.
**Journal of Number Theory**, Elsevier (2015), doi:10.1016/j.jnt.2015.02.020. by Kristin Lauter, Michael Naehrig, Tonghai Yang. - On the quaternion l-isogeny path problem. In
**ANTS-XI**, GyeongJu, Korea 2014. With David Kohel, Christophe Petit, Jean-Pierre Tignol. http://arxiv.org/pdf/1406.0981.pdf - Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants. In
**ANTS-XI**, GyeongJu, Korea 2014. Craig Costello, Alyson Deines-Schartz, Tonghai Yang. http://eprint.iacr.org/2014/424.pdf - Improved CRT Algorithm for Class Polynomials in Genus 2, by
*Kristin Lauter and Damien Robert,*In**ANTS-X**: Algorithmic Number Theory Symposium 2012, 2012/443 - Abelian surfaces admitting an (l,l)-endomorphism, by Reinier Broker, Kristin Lauter, Marco Streng,
**Journal of Algebra**, arXiv:1106.1884 - Explicit CM-theory for level 2-structures on abelian surfaces, by Reinier Broker, David Gruenewald, Kristin Lauter,
**Algebra and Number Theory**, Vol. 5 (2011), No. 4, 495-528. DOI: 10.2140/ant.2011.5.495, arXiv:0910.1848 - Computing genus 2 curves from invariants on the Hilbert moduli space, by Kristin Lauter and Tonghai Yang,
**Journal of Number Theory**, Elliptic Curve Cryptography Volume 131, Issue 5 (2011) 2010/294 ( PDF ) - Modular polynomials via isogeny volcanoes Reinier Broker, Kristin Lauter, Andrew V. Sutherland,
**Mathematics of Computation**volume 81, issue 278, pages 1201-1231, 2012. arXiv:1001.0402 [pdf, ps, other] - Evaluating Igusa functions Reinier Broker, Kristin Lauter Preprint, 2010. arXiv:1005.1234 [pdf],
**Mathematics of Computation**. - Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields, by Kristin Lauter and Ning Shang, in
**Designs, Codes and Cryptography**. 2010/529 (PDF) - Evaluating large degree isogenies and applications to pairing based cryptography,
*by Reinier Broker, Denis Charles, Kristin Lauter*, in**Pairing 2008**. - Modular polynomials for genus 2,
*by Reinier Broker and Kristin Lauter,***London Math Society Journal of Mathematics and Computation***.* - Computing Hilbert class polynomials,
*by Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter,*in**ANTS 2008**, Selfridge Prize for best paper. - Computing endomorphism rings of Jacobians of genus 2 curves over finite fields,
*by David Freeman, Kristin Lauter,*in Proceedings of**SAGA 2007**, Number Theory and its applications, World Scientific. (http://www.arxiv.org/math.NT/0701305). - Computing Modular Polynomials,
*by Denis Charles, Kristin Lauter*,**London Math Society Journal of Computation and Mathematics**, The LMS JCM, (8) 195-204. - A CRT algorithm for constructing genus 2 curves over finite fields,
*by Kirsten Eisentraeger, Kristin Lauter*, in Proceedings of AGCT 2005:**Arithmetics, Geometry, and Coding Theory**– Société Mathématique de France, 2011. http://www.arxiv.org/math.NT/0405305 - Constructing elliptic curves with a known number of points over a prime field,
*by A. Agashe, K. Lauter, R.**Venkatesan*, High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams,**Fields Institute Communications Series**, Volume 42, pp. 1-17.

#### Number of points on curves over finite fields

- Genus-2 curves and Jacobians with a given number of points.
**LMS Journal of Computation and Mathematics**, With Reinier Bröker, Everett W. Howe, Peter Stevenhagen. http://arxiv.org/pdf/1403.6911.pdf - New methods for bounding the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter, in
**Geometry and Arithmetic**, Editors: C. Faber, G.Farkas, R. de Jong, European Mathematical Society 2012, pp. 173–212. - Pointless curves of genus 3 and 4, by Everett W. Howe, Kristin E. Lauter, Jaap Top, in
**Arithmetic, geometry and coding theory**, Yves Aubry – Gilles Lachaud (Éd.) Séminaires et Congrès**11**(2005), xviii+216 pages, pp. 125–141. - Improved upper bounds for the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter,
**Annales de l’Institut Fourier**, volume 53, 6(2003), 1677–1737. - The maximum number of points on a curve of genus 4 over F
_{8}is 25, by David Savitt, with an Appendix by K. Lauter,**Canad. J. Math.**, 55 (2003), 331–352. - The maximum or minimum number of rational points on genus three curves over finite fields,
*by Kristin Lauter with an Appendix by J-P. Serre*,**Compositio Math.**134 (2002) 87–111. - Geometric methods for improving the upper bounds on the number of rational points on algebraic curves over finite fields. Lauter, Kristin, with an appendix in French by J.-P. Serre.
**J. Algebraic Geom.**10 (2001), no. 1, 19–36. - Zeta functions of curves over finite fields with many rational points. Kristin Lauter,
**Coding theory, cryptography and related areas (Guanajuato, 1998)***,*167–174,*Springer, Berlin,*2000. - Non-existence of a curve over
**F**3 of genus 5 with 14 rational points. Kristin Lauter,**Proc. Amer. Math. Soc.**128 (2000), no. 2, 369–374. MR 1664414.Abstract, references, and article information View Article: PDF - Improved upper bounds for the number of rational points on algebraic curves over finite fields. Kristin Lauter,
**C. R. Acad. Sci. Paris Sér. I Math.**328 (1999), no. 12, 1181–1185. - A Formula for Constructing Curves over Finite Fields with Many Rational Points Kristin Lauter,
**Journal of Number Theory**, Volume 74, Issue 1, January 1999, Pages 56-72. - Deligne-Lusztig curves as ray class fields. Kristin Lauter,
**Manuscripta Math.**98 (1999), no. 1, 87–96. - Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points, K. Lauter,
**Algorithmic Number Theory Symposium**(ed. by H. Cohen), Lecture Notes in Computer Science 1122, 187-195 Springer, Berlin 1996.

## Talks and conferences

#### Invited talks

- British Math Colloquium 2016, Public Lecture, March 21, 2016
- Stanford Genomics and Patient Privacy Conference, Invited Speaker and Panelist, Palo Alto, March 11, 2016, Video
- AMS-MAA Invited Address, Joint Math Meetings 2016, Seattle, Washington, January 8, 2016.
- Invited Speaker, AGNES: Algebraic Geometry North Eastern Series, Brown University, Cryptographic Problems in Algebraic Geometry, October 2, 2015
- Invited Speaker, Conference on Mathematics of Cryptography, UC Irvine, August 31-September 3, 2015. Talk 1: slides video, Talk 2: slides video
- Invited Speaker, The Mathematics of Modern Cryptography Workshop, Simons Institute, Berkeley, California, July 7, 2015. Video
- Invited Speaker, AGCT 2015, CIRM Luminy, May 22, 2015
- Invited Talk, Eurocrypt 2015, Sofia, Bulgaria, April 29, 2015 Slides, Bristol Blog, Wikipedia
- Speaker, Columbia-CUNY-NYU Number Theory Seminar, April 23, 2015
- Plenary Speaker, London Math Society 150 Anniversary Celebration: It All Adds Up, University of Oxford Mathematical Institute, How to Keep Your Secrets in a Post-Quantum World, April 17, 2015 +Plus Magazine article
- Keynote Address, Secure Genome Analysis iDASh Workshop, March 16, 2015 [slides] [video]
- Keynote Address, Biological Data Sciences Meeting, Cold Spring Harbor Laboratories, November 6, 2014. Genome Web article.
- Invited Speaker, LatinCrypt 2014, Florianópolis, Brazil, September 18, 2014.
- Speaker, Algorithmic Number Theory Symposium, ANTS-XI, GyeongJu, Korea, August 2014.
- Introduction to Modern Mathematics Lecture Series, Mathematical Sciences Center, Tsinghua University, Beijing, China, August 1, 2014.
- Morningside Center of Mathematics, Chinese Academy of Science, Number Theory Seminar, Beijing, China, July 31, 2014.
- EDGE Colloquium Speaker, 2014 EDGE Program, Harvey Mudd, June 2014.
- Project Group Leader, Women In Numbers 3, BIRS Banff, Canada, April 2014.
- Plenary Speaker, Applications of Automorphic Forms in Number Theory and Combinatorics, Louisiana State University, April 2014.
- Invited Speaker, AAAS Annual Meeting 2014, Panel and News Briefing, Genomic Privacy, Chicago, February 2014. Genetic Privacy Blog, BioIT World
- Project Group Leader and Invited Speaker, WINE Women In Numbers-Europe, CIRM Luminy, France, October 2013. AMS Blog
- Invited Speaker, 17th Workshop on Elliptic Curve Cryptography, Leuven, Belgium, September 2013
- Mini-course lecturer and Invited Speaker, Algebraic and Explicit Methods in Number Theory, Summer School and Conference, Besancon, France, September 2013.
- Invited Speaker, Arithmetic, Geometry, Cryptography and Coding Theory, CIRM Luminy, June 2013.
- Invited Speaker, Stanford Number Theory Seminar, Palo Alto, February, 2013.
- Colloquium Speaker, UC Berkeley Colloquium and Number Theory Seminar speaker, Berkeley, February 2013.
- Colloquium, Math Department, Ewha Women’s University, November 30, 2012, Seoul, Korea
- Invited Speaker, ICISC 2012, 15th Annual International Conference on Information Security and Cryptology, November 28, 2012, Seoul, Korea
- Invited Address, SIAM 2012 Annual Meeting, July 9, 2012.
- Invited Speaker, Heilbronn Annual Conference 2012.
- Arnold Family Public Lecture, Institute for Mathematics and Its Applications, October 2012.
- Keynote, ACM Cloud Computing Security Workshop, CCSW 2012
- Cryptography Seminar, University of Bristol, September 21, 2012
- Invited MAA Address, Spring 2012 SoCal-Nev Section Meeting, April 14, 2012
- Number Theory Seminar, University of Maryland, May 1, 2012
- Homomorphic Computing Conference, National Intelligence Council, May 2012
- Keynote Speaker, 4th Annual Women in Mathematics Symposium, January 21, 2012
- UW-PIMS Mathematics Colloquium, University of Washington, January 13, 2012 video
- WIN2 Women in Numbers, speaker and project leader, BIRS, Banff, November 2011. Video
- Keynote Address, FMI Forum for Mathematics in Industry, University of Hawaii, October 2011.
- Invited Speaker, BC/MIT Number Theory seminar, Boston, September 20, 2011.
- Colloquium Speaker, Boston University CS Department, September 19, 2011.
- AWM Association for Women in Mathematics 40
^{th}anniversary, invited speaker, Number Theory Special Session, Brown University, September 2011. - Keynote speaker at SAC 2011 (Selected Areas of Cryptography) on Security issues for Cloud Computing.
- Faculty Summit Panel, Cryptographic Cloud Storage and Services, July 2011. Video
- MSR/INRIA Joint Center, talk on Elliptic Curve Cryptography, Paris, June 2011
- IML Institut de Mathematiques de Luminy, Marseille, May 2011 (2 talks)
- Invited Speaker, Mathematics of Information-Theoretic Cryptography. February 2011 IPAM, UCLA
- Caltech Number Theory Seminar, February 2011.
- Invited Speaker, Connections for Women, Arithmetic Statistics, Hard Problems in Number Theory arising from Cryptography, MSRI, Berkeley, January 2011
- Invited Speaker, Southern California Number Theory Day, UC Irvine, November 2010.
- Invited Speaker, Number Theory Special Session, Western Sectional Meetings AMS, UCLA October 2010
- Speaker, ECC 2010, 25
^{th}anniversary of Elliptic Curve Cryptography, Microsoft Research, October 2010 Video - Invited Plenary lecture, Canadian Number Theory Association (CNTA XI), July 2010
- Invited Speaker, Counting points: theory, algorithms and practice, April 2010 CRM, Montréal
- AMS National Meetings San Francisco, CA, January 2010 (2 Special Sessions) Arithmetic of Function Fields, Arithmetic Geometry
- UT-Austin Distinguished Women in Mathematics Series, February 2010 (3 talks)
- UC Berkeley Colloquium and Number Theory Seminar, October 2009
- NIH mHealth, Washington D.C., October 2009, Panelist on Ethics, Privacy, and Security.
- Invited Plenary lecture, Korean Institute for Advanced Study, KWMS 6
^{th}annual conference, June 2009 - Invited Lectures (2) 4th International Workshop on Mathematical Cryptology, Korea, June 2009.
- Speaker, GeoCrypt 2009, Guadeloupe, May 2009
- Invited Opening lecture, AGCT-12, Algebraic Geometry, Coding Theory, and Cryptography, March 2009.
- Distinguished Researcher, CRA-W Advanced Career Mentoring Workshop (CAPP), November, 2008, Santa Fe, New Mexico
- AMS meeting, Vancouver, October 2008, Special session on Number Theory
- WIN, Women in Numbers, speaker and project leader, BIRS, Banff, November 2008.
- Pairing08, 2 talks, Royal Holloway, London, September 2008
- C4: Computations on Curves for Cryptography and Coding, Paris, June, 2008.
- MSR/INRIA Joint Center, talk on Cryptographic Hash Functions, Paris, June 2008
- IML Institut de Mathematiques de Luminy, Marseille, May 2008 (2 talks)
- University of Chicago, Colloquium and Number Theory Seminar, September 2007
- Invited Speaker, 4th Spring Conference on Siegel Modular Forms and Abelian Varieties, Hamana Lake, Japan, February 2007. Slides
- 2nd NIST Hash Function Workshop Cryptographic Hash Functions from Expander Graphs, August, 2006. slides
- Invited talk, Inaugural ITA Information Theory and Applications conference, UCSD, February 2006, slides
- CISS06 Talk by Denis Charles Slides
- PKC2006 Talk by Anton Mityagin Slides
- SAGE Days 1 Conference, UCSD, February 2006. Slides
- Invited Speaker, Intersection of Arithmetic Cycles and Automorphic Forms, CRM Montreal, December, 2005. Slides
- NIST Hash Function Workshop, Talk by Josh Benaloh, NIST Gaithersburg, MD, October, 2005 slides

#### Selected past invited talks

Older talks…to be completed:

**ANTS II**: Algorithmic Number Theory Symposium, Universite de Bordeaux, May 20, 1996.

**Oberwolfach** Meeting on Finite Fields, Oberwolfach, Germany, January 20, 1997.

**Connecticut Valley Undergraduate Colloquium Series**, UMass, Amherst, April 23, 1997.

**AGCT-6**: Arithmetic, Geometry, and Coding Theory, C.I.R.M. Luminy, France, June 24, 1997.

**AMS Summer Research Conference**, Applications of Curves over Finite Fields, Seattle, 1997.

**European Research Conference**, Number Theory and Arithmetical Geometry, Spain, Oct 1997.

**ICCC**: 2nd International Conference on Coding Theory and Cryptography, Mexico, April, 1998.

**AMS Fall Western Section Meeting**, Tucson, Arizona, November 14-15, 1998

**Oberwolfach** Meeting on Explicit Methods in Number Theory, Oberwolfach, July, 1999.

**AGCT-7**: Arithmetic, Geometry, and Coding Theory, October, 1999, C.I.R.M., Luminy, France

**Workshop on Unusual Applications of Number Theory**, 10-14 January 2000, DIMACS

**AMS Western Section Regional Meeting**, Invited Address, October, 2000, San Francisco

**MSRI Workshop on Number Theory**, Genus three curves over finite fields *October, 2000 *

**Sixth Pacific North West Number Theory Conference **Vancouver, March 2002.

**IPAM New Trends in Cryptography, **April 2002

**University of Michigan Undergraduate Colloquium, **April 2002

**High Primes and Misdemeanours**, Lectures in honour of Hugh Williams, Banff 2003

**Pacific Northwest Number Theory Conference, **Vancouver, April 2004

**BIRS Workshop**: Explicit Methods in Number Theory, November, 2004

**BIRS Workshop** Number Theory Inspired by Cryptography November, 2005.

#### Steering committees

- ACM Cloud Computing Security Workshop (CCSW)
- Workshop on Elliptic Curve Cryptography (ECC)
- Women In Numbers Network (WIN)

#### Program co-chair

- SAC 2013: Selected Areas in Cryptography 2013, 20th Anniversary! Proceedings
- LatinCrypt 2015 Guadalajara, Mexico, August 23rd to 26th, 2015 Proceedings

#### Conferences co-organized

- IPAM Workshop on Algebraic Geometry for Coding Theory and Cryptography, February 22-26, 2016 (Research Collaboration Conference, for men and women! ~43% female) Blog Post: IPAMania!
- Dagstuhl Seminar: Modern Cryptography and Security: An Inter-Community Dialogue, January 31 – February 5 , 2016, Dagstuhl Seminar 16051. An innovative interactive format.
- ICERM Workshop: Modular Forms and Curves of Low Genus: Computational Aspects, September 28 – October 2, 2015 (~30% Female Invited Speakers!)
- AWM Workshop in Number Theory, Joint Mathematical Meetings, San Diego 2013
- Workshop on Applied Homomorphic Cryptography, Financial Crypto, April, 2013
- Conference on Algebraic Informatics, Sept 3-6, 2013
- Foundations of Computational Mathematics, Montevideo, Uruguay, December, 2014
- ANTS 10 10th Algorithmic Number Theory Symposium, San Diego, July 2012
- AWM Association for Women in Mathematics 40
^{th}Anniversary Conference, Brown University, September 2011 - SIAM Conference on Applied Algebraic Geometry, UNC, October 2011
- ECC 2010, 25
^{th}anniversary of Elliptic Curve Cryptography, MSR, October 2010 - Computer Security and Cryptography, CRM, Montreal, April 12-16, 2010
- Cryptography Retrospective, Fields Institute, Toronto, May 2009
- WIN: Women in Numbers, Banff International Research Station, November 2008
- AMS Special Session on Low Genus Curves, San Diego, January 2008
- 10th Annual Pacific Northwest Number Theory Conference, MSR/DigiPen, Feb 2006
- IPAM Workshop on Number Theory and Cryptography – Open Problems, Oct. 2006
- AMS Special Session on Computational Arithmetic Geometry, April 2006
- 5th Pacific Northwest Number Theory Conference, MSR/DigiPen, April 2001
- AMS Special Session on Low Genus Curves and Applications, October 2000

#### Program committees

## In The News

#### Homomorphic encryption

The Future of Cryptography | *Queen Elizabeth Prize for Engineering* | August 2018

Microsoft researchers smash homomorphic encryption speed barrier | *The Register* | February 2016

Microsoft boffins build better crypto for secure medical data crunching | *The Register* | November 2015

Microsoft helps out healthcare sector with new data encryption algorithm | *SoftPedia News* | November 2015

Core Concept: Homomorphic encryption *PNAS* | July 2015

How Apple, Google, and Microsoft approach genetic research and secure DNA data in the cloud | *SPLINTER* | May 2015

Kristin Lauter on cryptography and mathematics | *XRDS/ACM Crossroads* | March 2015

Cryptographer’s challenge: Keeping genetic secrets while advancing genetic research | *Microsoft Research Blog* | March 2015

New Community Challenge Seeks to Evaluate Methods of Computing on Encrypted Genomic Data | *genome web* | November 2014

#### Genomic privacy

A Cipher for Your Genome | *GeneWatch* | January – April 2014

How to Hide Your Genome | *Science News* | February 2014

Your Genome: to share or not to share | *AAAS News* | February 2014

AAAS Newsroom Panel: Live demo (minutes 12-15) | *EurekAlert!* | February 2014

Keep Your Genetic Data Secure | *PlanetSave* | February 2014

Big Data, Big Changes | *Perfectly Awkward Science* | May 2014

#### Cryptographic hash functions

#### Cryptographic cloud storage

Searching an Encrypted Cloud | *David Talbot of Technology Review* | December 2009

Video Interview: The Cryptographic Solution | *David Talbot of Technology Review* | December 2009

Security in the Ether | *David Talbot of Technology Review* | December 2009

Considerations for the Cryptographic Cloud | *HPC in the Cloud* | 2010

Security in the Cloud | *Communications of the ACM* | November 2010

#### Practical somewhat homomorphic encryption

Alice and Bob in Cipherspace | *Brian Hayes of American Scientist* | September 2012

A Cloud that Can’t Leak | *Tom Simonite of Technology Review* | August 2011

Mehr Sicherheit für Datenwolke | *Tom Simonite, Niels Boeing of Technology Review* | August 2011

ACM Technews, Twitter posts, Business Week, Orange Business blogs, CloudAve

#### Women in math

It All Adds Up! Celebration of 150 Years of Women in Mathematics | *+plus Magazine* | May 26, 2015

First Woman Fields Medalist | *UPI* | August 2014

AWM President Elect | *AWM Newsletter* | March 2014

Conference in Honor of Winnie Li, LSU Communications and Media Relations, Interview on Channel 9 WAFB | April 2014

PhD+epsilon | Conference diaries: Women in Numbers | *Europe AMS* | October 30, 2013

PhD+epsilon | Sage Days 50 – Women in Sage | *AMS* | July 2013

PhD+Epsilon | Women In SAGE 3 | *AMS* | July 2012

AWM-Microsoft Research Prize | *AWM Newsletter* | November 2012

WIN2 2011 Women In Numbers | *Asian Pacific Mathematics Newsletter* | January 2012

PhD+epsilon | AWM 40th Anniversary Conference | *AMS blog* | October 2011

WIN 2008 Women In Numbers Conference | *Fields Institute Newsletter* | January 2009

#### Other News

First Woman Ever Wins Math’s ‘Nobel Prize’ | *UPI* | August 2014

Microsoft Research’s Lauter Named Next AWM President | *Microsoft Research Blog* | January 2014

Alice and Bob in Cipherspace | *American Scientist* | September – October 2012

Top Researchers Inspire Interns | *Microsoft Research Blog* | August 2011

A Cloud That Can’t Leak | *MIT Technology Review* | August 2011

Security in the Cloud | *Communications of the ACM* | November 2010

Searching an Encrypted Cloud | *MIT Technology Review* | November 2009