Kristin Lauter is a Principal Researcher and Research Manager for the Cryptography and Privacy Research group at Microsoft Research. Her research areas are number theory and algebraic geometry, with applications to cryptography. She is particularly known for her work on homomorphic encryption, elliptic curve cryptography, and for introducing supersingular isogeny graphs as a hard problem into cryptography. She served as President of the Association for Women in Mathematics from 2015 –2017.
Lauter was elected to the 2015 Class of Fellows of the American Mathematical Society “for contributions to arithmetic geometry and cryptography as well as service to the community.” In 2017, she was selected as a Fellow of the Association for Women in Mathematics in the inaugural class. She was selected as the Polya Lecturer for the Mathematical Association of America for 2018-2020. In 2008, Lauter and her coauthors were awarded the Selfridge Prize in Computational Number Theory.
She is a co-founder of the Women in Numbers Network, a research collaboration community for women in number theory, and she is the lead PI for the AWM NSF Advance Grant (2015-2020) to create and sustain research networks for women in all areas of mathematics. She is the Series Editor for the AWM Springer Series. She serves on the Advisory Board of the Banff International Research Station, the Board of Trustees of MSRI, and has served on the Council of the American Mathematical Society (2014-2017).
Lauter received her BA, MS, and Ph.D degrees in mathematics from the University of Chicago, in 1990, 1991, and 1996, respectively. Prior to joining Microsoft, she held positions as a Visiting Scholar at Max Planck Institut fur Mathematik in Bonn, Germany (1997), T.H. Hildebrandt Research Assistant Professor at the University of Michigan (1996-1999), and a Visiting Researcher at Institut de Mathematiques Luminy in France (1999).
Progress in Cryptology — LATINCRYPT 2015, 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015. Lecture Notes in Computer Science 9230, Springer. Co-edited with Francisco Rodriguez-Henriquez.
Selected Areas in Cryptography 2013, Lecture Notes in Computer Science, Springer 2014. Co-edited with Tanja Lange and Petr Lisonek.
WIN–Women in Numbers: Research Directions in Number Theory, Fields Institute Communications Series, Volume 60 (2011). Co-edited with Alina-Carmen Cojocaru, Rachel Pries, Renate Scheidler.
Computational Arithmetic Geometry. AMS Contemporary Mathematics Series, volume 463 (2008). Co-edited with Ken Ribet.
Topics in Algebraic and Noncommutative Geometry, Proceedings of the Conferences in memory of Ruth Michler. AMS Contemporary Mathematics Series, volume 324 (2003) . Co-edited with Caroline Grant Melles, Jean-Paul Brasselet, Gary Kennedy, Lee McEwan.
Articles by area
- 2015/971 ( PDF ) Attacks on Search RLWE Hao Chen, Kristin Lauter, and Katherine E. Stange
- 2015/965 ( PDF ) Private Genome Analysis through Homomorphic Encryption Miran Kim and Kristin Lauter, BioMed Central, Journal of Medical Informatics and Decision Making
- 2015/758 ( PDF ) Ring-LWE Cryptography for the Number Theorist Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange, Proceedings of WIN3
- 2015/386 ( PDF ) Privately Evaluating Decision Trees and Random Forests David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter
- 2015/176 ( PDF ) Key Recovery for LWE in Polynomial Time Kim Laine and Kristin Lauter
- 2015/133 ( PDF ) Private Computation on Encrypted Genomic Data Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig, LatinCrypt 2014 (GenoPri 2014).
- 2015/132 ( PDF ) Homomorphic Computation of Edit Distance Jung Hee Cheon and Miran Kim and Kristin Lauter, Workshop on Applied Homomorphic Cryptography 2015
- 2015/106 ( PDF ) Provably weak instances of Ring-LWE Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange, CRYPTO 2015
- 10.1093/bioinformatics/btv563 HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinformatics. Shuang Wang, Yuchen Zhang, Wenrui Dai, Kristin Lauter, Miran Kim, Yuzhe Tang, Hongkai Xiong, Xiaoquian Jiang.
- Weak Instances of PLWE. In Selected Areas of Cryptography 2014, Montreal, Canada. With Kirsten Eisentraeger, Sean Hallgren. http://eprint.iacr.org/2014/784.pdf
- Time-Memory Trade-offs for Index Calculus in Genus 3. Journal of Mathematical Cryptology, Volume 9, Issue 2. Pages 95-114, With Kim Laine. http://eprint.iacr.org/2014/346.pdf
- Private Predictive Analysis on Encrypted Medical Data. Journal of Biomedical Informatics, 2014. With Joppe W. Bos and Michael Naehrig. http://eprint.iacr.org/2014/336.pdf
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme, in IMA CC 2013, with Joppe W. Bos, Jake Loftus, and Michael Naehrig. http://eprint.iacr.org/2013/075.pdf
- ML Confidential: Machine Learning on Encrypted Data Thore Graepel, Kristin Lauter, Michael Naehrig 2012/323 ( PDF ), ICISC 2012, LNCS 7839, pages 1-21. Springer, Heidelberg, 2013.
- Can Homomorphic Encryption Be Practical? with Michael Naehrig, Vinod Vaikuntanathan, in CCSW 2011, ACM Cloud Computing Security Workshop 2011.
- An Anonymous Health Care System, by Melissa Chase and Kristin Lauter, in HealthSec, 1st USENIX Workshop on Health Security and Privacy, 2010. 2011/016 (PDF)
- Cryptographic Cloud Storage, with Seny Kamara, in Proceedings of Financial Cryptography FC 2010: Workshop on Real-Life Cryptographic Protocols and Standardization.
- Patient Controlled Encryption: patient privacy in electronic medical records, with Josh Benaloh, Melissa Chase, Eric Horvitz, in CCSW’09 ACM Cloud Computing Security Workshop.
- Full Cryptanalysis of LPS and Morgenstern Hash Function, by Christophe Petit, Kristin Lauter, Jean-Jacques Quisquater, in Security and Cryptography of Networks 2008
- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences by Kristin E. Lauter and Katherine E. Stange, in Selected Areas in Cryptography 2008
- Stronger Security of Authenticated Key Exchange, by Brian LaMacchia, Kristin Lauter, Anton Mityagin, in ProvSec2007, submitted version, published version.
- Signatures for Network Coding, by Denis Charles, Kamal Jain, Kristin Lauter, Invited paper for CISS06, in Int. J. Information and Coding Theory (IJICoT)
- Security Analysis of KEA Authenticated Key Exchange, by Kristin Lauter and Anton Mityagin, In PKC2006
- Cryptographic hash functions from expander graphs, by Denis Charles, Eyal Goren, Kristin Lauter, Second NIST Hash Function Workshop, in Journal of Cryptology.
- The Advantages of Elliptic Curve Cryptography for Wireless Security, IEEE Wireless Comm. Magazine, February 2004
- Bad reduction of genus-3 curves with complex multiplication. Proceedings of WIN-Europe, With Irene Bouw, Jenny Cooley, Elisa Lorenzo Garcia, Michelle Manes, Rachel Newton, Ekin Ozman. Association for Women in Mathematics Series, Volume 2, Springer pp. 109-151. http://arxiv.org/pdf/1407.3589.pdf
- An arithmetic intersection formula for denominators of Igusa class polynomials, by Kristin Lauter, Bianca Viray, American Journal of Mathematics, 137 (2015), no. 2, 497–533. doi: 10.1353/ajm.2015.0010, arXiv:1210.7841, http://eprint.iacr.org/2012/614,
- On singular moduli for arbitrary discriminants, by Kristin Lauter, Bianca Viray, International Mathematics Research Notices, Volume 2015, Issue 19, pp. 9206-9250. arXiv:1206.6942
- Comparing arithmetic intersection formulas for denominators of Igusa class polynomials, arXiv:1211.0788. by J. Anderson, J. Balakrishnan, K. Lauter, J. Park, B. Viray. WIN2 Proceedings Volume, AMS 2013,
- A Gross-Zagier formula for quaternion algebras over totally real fields, by Eyal Z. Goren and Kristin E. Lauter, to appear in Algebra and Number Theory. 2011/666
- Igusa class polynomials, embeddings of quartic CM fields, and arithmetic intersection theory, by Helen Grundman, Jennifer Johnson-Leung, Kristin Lauter, Adriana Salerno, Bianca Viray, Erika Wittenborn, in WIN–Women in Numbers: Research Directions in Number Theory, Fields Institute Communications Series, Volume 60 (2011). arXiv:1006.0208 [pdf]
- Genus 2 Curves with Complex Multiplication, Eyal Z. Goren and Kristin E. Lauter, Int Math Res Notices, published online April 12, 2011 doi:10.1093/imrn/rnr052 2010/156
- Abelian surfaces admitting an (l,l)-endomorphism, by Reinier Broker, Kristin Lauter, Marco Streng, Preprint 2011. arXiv:1106.1884 [pdf], Journal of Algebra 394 (2013) 374–396.
- The distance between superspecial abelian varieties with real multiplication, by Eyal Goren, Kristin Lauter, Journal of Number Theory, Volume 129, Issue 6, June 2009, Pages 1562-1578 doi:10.1016/j.jnt.2008.07.005
- Explicit Heegner points: Kolyvagin’s conjecture and non-trivial elements in the Shafarevich–Tate group by Dimitar Jetchev, Kristin Lauter, William Stein, Journal of Number Theory, Volume 129, Issue 2, February 2009, Pages 284-302
- Families of Ramanujan graphs and quaternion algebras, by Denis Charles, Eyal Goren, Kristin Lauter, in Groups and Symmetries: From Neolithic Scots to John McKay, AMS/CRM, 2009.
- Computing the Cassels pairing on Kolyvagin classes in the Shafarevich-Tate group, by Kirsten Eisentraeger, Dimitar Jetchev, Kristin Lauter, in Pairing 2008.
- Evil Primes and Superspecial Moduli, by Eyal Goren, Kristin Lauter, International Mathematics Research Notices, volume 2006, Article ID 53864, pages 1–19. (http://arxiv.org/abs/math/0512472)
- Class invariants of quartic CM fields, by Eyal Goren, Kristin Lauter, Annales de l’Institut Fourier, Vol. 57 no. 2 (2007), p.457-480. (http://www.arxiv.org/math.NT/0404378)
- Primes in the denominators of Igusa class polynomials, by Kristin Lauter. (http://www.arxiv.org/math.NT/0301240)
Cryptographic implementation improvements
- Two is Greater than One, by Joppe W. Bos, Craig Costello, Huseyin Hisil, and Kristin Lauter. Eurocrypt 2013, MSR-TR-2012-117, November 2012
- High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition, CHES 2013, Lecture Notes in Computer Science, with Joppe W. Bos, Craig Costello, Huseyin Hisil.
- Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings, by Craig Costello, Kristin Lauter, and Michael Naehrig, Progress in Cryptology – INDOCRYPT 2011, Lecture Notes in Computer Science 7107, Springer-Verlag (2011), pp 320–342.2011/465 (PDF)
- Group Law Computations on Jacobians of Hyperelliptic Curves, by Craig Costello and Kristin Lauter, in Selected Areas in Cryptography SAC 2011, Lecture Notes in Computer Science Volume 7118, Springer-Verlag (2012), pp 92-117. 2011/306 (PDF)
- Affine Pairings on ARM, Tolga Acar, Kristin Lauter, Michael Naehrig, Daniel Shumow, In Pairing-Based Cryptography – Pairing 2012. 2011/243
- An Analysis of Affine Coordinates for Pairing Computation, by Kristin Lauter, Peter L. Montgomery, Michael Naehrig, Pairing-Based Cryptography – Pairing 2010, Lecture Notes in Computer Science 6487, Springer-Verlag (2010), pp 1–20.
- Improved Weil and Tate pairings for elliptic and hyperelliptic curves, by K. Eisentraeger, K. Lauter, P.L. Montgomery, In: Algorithmic Number Theory – ANTS-VI, Buell (Ed.), LNCS 3076, 169–183. Published version. http://www.arxiv.org/ math.NT/0311391
- Trading Inversions for Multiplications in Elliptic Curve Cryptography, by Mathieu Ciet, Marc Joye, Kristin Lauter and Peter L. Montgomery, In Designs, Codes, and Cryptography. Published version. http://eprint.iacr.org/2003/257/
- Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation, by K. Eisentraeger, K. Lauter, P.L. Montgomery, In: Topics in Cryptology – CT-RSA 2003, M. Joye (Ed.): LNCS 2612, 343-354, Springer, Berlin 2003.
- The equivalence of the geometric and algebraic group laws for Jacobians of genus 2 curves, by K. Lauter, Topics in Algebraic and Noncommutative Geometry, AMS Contemporary Mathematics Series 324 (2003) 165–171.
Algorithmic number theory
- Denominators of Igusa class polynomials, by Kristin Lauter; Bianca Viray, Publications mathématiques de Besançon no. 2 (2014), p. 5-29 Détail
- Hilbert theta series and invariants of genus 2 curves. Journal of Number Theory, Elsevier (2015), doi:10.1016/j.jnt.2015.02.020. by Kristin Lauter, Michael Naehrig, Tonghai Yang.
- On the quaternion l-isogeny path problem. In ANTS-XI, GyeongJu, Korea 2014. With David Kohel, Christophe Petit, Jean-Pierre Tignol. http://arxiv.org/pdf/1406.0981.pdf
- Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants. In ANTS-XI, GyeongJu, Korea 2014. Craig Costello, Alyson Deines-Schartz, Tonghai Yang. http://eprint.iacr.org/2014/424.pdf
- Improved CRT Algorithm for Class Polynomials in Genus 2, by Kristin Lauter and Damien Robert, In ANTS-X: Algorithmic Number Theory Symposium 2012, 2012/443
- Abelian surfaces admitting an (l,l)-endomorphism, by Reinier Broker, Kristin Lauter, Marco Streng, Journal of Algebra, arXiv:1106.1884
- Explicit CM-theory for level 2-structures on abelian surfaces, by Reinier Broker, David Gruenewald, Kristin Lauter, Algebra and Number Theory, Vol. 5 (2011), No. 4, 495-528. DOI: 10.2140/ant.2011.5.495, arXiv:0910.1848
- Computing genus 2 curves from invariants on the Hilbert moduli space, by Kristin Lauter and Tonghai Yang, Journal of Number Theory, Elliptic Curve Cryptography Volume 131, Issue 5 (2011) 2010/294 ( PDF )
- Modular polynomials via isogeny volcanoes Reinier Broker, Kristin Lauter, Andrew V. Sutherland, Mathematics of Computation volume 81, issue 278, pages 1201-1231, 2012. arXiv:1001.0402 [pdf, ps, other]
- Evaluating Igusa functions Reinier Broker, Kristin Lauter Preprint, 2010. arXiv:1005.1234 [pdf], Mathematics of Computation.
- Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields, by Kristin Lauter and Ning Shang, in Designs, Codes and Cryptography. 2010/529 (PDF)
- Evaluating large degree isogenies and applications to pairing based cryptography, by Reinier Broker, Denis Charles, Kristin Lauter, in Pairing 2008.
- Modular polynomials for genus 2, by Reinier Broker and Kristin Lauter, London Math Society Journal of Mathematics and Computation.
- Computing Hilbert class polynomials, by Juliana Belding, Reinier Broker, Andreas Enge, Kristin Lauter, in ANTS 2008, Selfridge Prize for best paper.
- Computing endomorphism rings of Jacobians of genus 2 curves over finite fields, by David Freeman, Kristin Lauter, in Proceedings of SAGA 2007, Number Theory and its applications, World Scientific. (http://www.arxiv.org/math.NT/0701305).
- Computing Modular Polynomials, by Denis Charles, Kristin Lauter, London Math Society Journal of Computation and Mathematics, The LMS JCM, (8) 195-204.
- A CRT algorithm for constructing genus 2 curves over finite fields, by Kirsten Eisentraeger, Kristin Lauter, in Proceedings of AGCT 2005: Arithmetics, Geometry, and Coding Theory – Société Mathématique de France, 2011. http://www.arxiv.org/math.NT/0405305
- Constructing elliptic curves with a known number of points over a prime field, by A. Agashe, K. Lauter, R. Venkatesan, High Primes and Misdemeanours: lectures in honour of the 60th birthday of Hugh Cowie Williams, Fields Institute Communications Series, Volume 42, pp. 1-17.
Number of points on curves over finite fields
- Genus-2 curves and Jacobians with a given number of points. LMS Journal of Computation and Mathematics, With Reinier Bröker, Everett W. Howe, Peter Stevenhagen. http://arxiv.org/pdf/1403.6911.pdf
- New methods for bounding the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter, in Geometry and Arithmetic, Editors: C. Faber, G.Farkas, R. de Jong, European Mathematical Society 2012, pp. 173–212.
- Pointless curves of genus 3 and 4, by Everett W. Howe, Kristin E. Lauter, Jaap Top, in Arithmetic, geometry and coding theory, Yves Aubry – Gilles Lachaud (Éd.) Séminaires et Congrès 11 (2005), xviii+216 pages, pp. 125–141.
- Improved upper bounds for the number of points on curves over finite fields, by Everett W. Howe, Kristin E. Lauter, Annales de l’Institut Fourier, volume 53, 6(2003), 1677–1737.
- The maximum number of points on a curve of genus 4 over F8 is 25, by David Savitt, with an Appendix by K. Lauter, Canad. J. Math., 55 (2003), 331–352.
- The maximum or minimum number of rational points on genus three curves over finite fields, by Kristin Lauter with an Appendix by J-P. Serre, Compositio Math. 134 (2002) 87–111.
- Geometric methods for improving the upper bounds on the number of rational points on algebraic curves over finite fields. Lauter, Kristin, with an appendix in French by J.-P. Serre. J. Algebraic Geom. 10 (2001), no. 1, 19–36.
- Zeta functions of curves over finite fields with many rational points. Kristin Lauter, Coding theory, cryptography and related areas (Guanajuato, 1998), 167–174, Springer, Berlin, 2000.
- Non-existence of a curve over F3 of genus 5 with 14 rational points. Kristin Lauter, Proc. Amer. Math. Soc. 128 (2000), no. 2, 369–374. MR 1664414.Abstract, references, and article information View Article: PDF
- Improved upper bounds for the number of rational points on algebraic curves over finite fields. Kristin Lauter, C. R. Acad. Sci. Paris Sér. I Math. 328 (1999), no. 12, 1181–1185.
- A Formula for Constructing Curves over Finite Fields with Many Rational Points Kristin Lauter, Journal of Number Theory, Volume 74, Issue 1, January 1999, Pages 56-72.
- Deligne-Lusztig curves as ray class fields. Kristin Lauter, Manuscripta Math. 98 (1999), no. 1, 87–96.
- Ray Class Field Constructions of Curves over Finite Fields with Many Rational Points, K. Lauter, Algorithmic Number Theory Symposium (ed. by H. Cohen), Lecture Notes in Computer Science 1122, 187-195 Springer, Berlin 1996.
Talks and conferences
- British Math Colloquium 2016, Public Lecture, March 21, 2016
- Stanford Genomics and Patient Privacy Conference, Invited Speaker and Panelist, Palo Alto, March 11, 2016, Video
- AMS-MAA Invited Address, Joint Math Meetings 2016, Seattle, Washington, January 8, 2016.
- Invited Speaker, AGNES: Algebraic Geometry North Eastern Series, Brown University, Cryptographic Problems in Algebraic Geometry, October 2, 2015
- Invited Speaker, Conference on Mathematics of Cryptography, UC Irvine, August 31-September 3, 2015. Talk 1: slides video, Talk 2: slides video
- Invited Speaker, The Mathematics of Modern Cryptography Workshop, Simons Institute, Berkeley, California, July 7, 2015. Video
- Invited Speaker, AGCT 2015, CIRM Luminy, May 22, 2015
- Invited Talk, Eurocrypt 2015, Sofia, Bulgaria, April 29, 2015 Slides, Bristol Blog, Wikipedia
- Speaker, Columbia-CUNY-NYU Number Theory Seminar, April 23, 2015
- Plenary Speaker, London Math Society 150 Anniversary Celebration: It All Adds Up, University of Oxford Mathematical Institute, How to Keep Your Secrets in a Post-Quantum World, April 17, 2015 +Plus Magazine article
- Keynote Address, Secure Genome Analysis iDASh Workshop, March 16, 2015 [slides] [video]
- Keynote Address, Biological Data Sciences Meeting, Cold Spring Harbor Laboratories, November 6, 2014. Genome Web article.
- Invited Speaker, LatinCrypt 2014, Florianópolis, Brazil, September 18, 2014.
- Speaker, Algorithmic Number Theory Symposium, ANTS-XI, GyeongJu, Korea, August 2014.
- Introduction to Modern Mathematics Lecture Series, Mathematical Sciences Center, Tsinghua University, Beijing, China, August 1, 2014.
- Morningside Center of Mathematics, Chinese Academy of Science, Number Theory Seminar, Beijing, China, July 31, 2014.
- EDGE Colloquium Speaker, 2014 EDGE Program, Harvey Mudd, June 2014.
- Project Group Leader, Women In Numbers 3, BIRS Banff, Canada, April 2014.
- Plenary Speaker, Applications of Automorphic Forms in Number Theory and Combinatorics, Louisiana State University, April 2014.
- Invited Speaker, AAAS Annual Meeting 2014, Panel and News Briefing, Genomic Privacy, Chicago, February 2014. Genetic Privacy Blog, BioIT World
- Project Group Leader and Invited Speaker, WINE Women In Numbers-Europe, CIRM Luminy, France, October 2013. AMS Blog
- Invited Speaker, 17th Workshop on Elliptic Curve Cryptography, Leuven, Belgium, September 2013
- Mini-course lecturer and Invited Speaker, Algebraic and Explicit Methods in Number Theory, Summer School and Conference, Besancon, France, September 2013.
- Invited Speaker, Arithmetic, Geometry, Cryptography and Coding Theory, CIRM Luminy, June 2013.
- Invited Speaker, Stanford Number Theory Seminar, Palo Alto, February, 2013.
- Colloquium Speaker, UC Berkeley Colloquium and Number Theory Seminar speaker, Berkeley, February 2013.
- Colloquium, Math Department, Ewha Women’s University, November 30, 2012, Seoul, Korea
- Invited Speaker, ICISC 2012, 15th Annual International Conference on Information Security and Cryptology, November 28, 2012, Seoul, Korea
- Invited Address, SIAM 2012 Annual Meeting, July 9, 2012.
- Invited Speaker, Heilbronn Annual Conference 2012.
- Arnold Family Public Lecture, Institute for Mathematics and Its Applications, October 2012.
- Keynote, ACM Cloud Computing Security Workshop, CCSW 2012
- Cryptography Seminar, University of Bristol, September 21, 2012
- Invited MAA Address, Spring 2012 SoCal-Nev Section Meeting, April 14, 2012
- Number Theory Seminar, University of Maryland, May 1, 2012
- Homomorphic Computing Conference, National Intelligence Council, May 2012
- Keynote Speaker, 4th Annual Women in Mathematics Symposium, January 21, 2012
- UW-PIMS Mathematics Colloquium, University of Washington, January 13, 2012 video
- WIN2 Women in Numbers, speaker and project leader, BIRS, Banff, November 2011. Video
- Keynote Address, FMI Forum for Mathematics in Industry, University of Hawaii, October 2011.
- Invited Speaker, BC/MIT Number Theory seminar, Boston, September 20, 2011.
- Colloquium Speaker, Boston University CS Department, September 19, 2011.
- AWM Association for Women in Mathematics 40th anniversary, invited speaker, Number Theory Special Session, Brown University, September 2011.
- Keynote speaker at SAC 2011 (Selected Areas of Cryptography) on Security issues for Cloud Computing.
- Faculty Summit Panel, Cryptographic Cloud Storage and Services, July 2011. Video
- MSR/INRIA Joint Center, talk on Elliptic Curve Cryptography, Paris, June 2011
- IML Institut de Mathematiques de Luminy, Marseille, May 2011 (2 talks)
- Invited Speaker, Mathematics of Information-Theoretic Cryptography. February 2011 IPAM, UCLA
- Caltech Number Theory Seminar, February 2011.
- Invited Speaker, Connections for Women, Arithmetic Statistics, Hard Problems in Number Theory arising from Cryptography, MSRI, Berkeley, January 2011
- Invited Speaker, Southern California Number Theory Day, UC Irvine, November 2010.
- Invited Speaker, Number Theory Special Session, Western Sectional Meetings AMS, UCLA October 2010
- Speaker, ECC 2010, 25th anniversary of Elliptic Curve Cryptography, Microsoft Research, October 2010 Video
- Invited Plenary lecture, Canadian Number Theory Association (CNTA XI), July 2010
- Invited Speaker, Counting points: theory, algorithms and practice, April 2010 CRM, Montréal
- AMS National Meetings San Francisco, CA, January 2010 (2 Special Sessions) Arithmetic of Function Fields, Arithmetic Geometry
- UT-Austin Distinguished Women in Mathematics Series, February 2010 (3 talks)
- UC Berkeley Colloquium and Number Theory Seminar, October 2009
- NIH mHealth, Washington D.C., October 2009, Panelist on Ethics, Privacy, and Security.
- Invited Plenary lecture, Korean Institute for Advanced Study, KWMS 6th annual conference, June 2009
- Invited Lectures (2) 4th International Workshop on Mathematical Cryptology, Korea, June 2009.
- Speaker, GeoCrypt 2009, Guadeloupe, May 2009
- Invited Opening lecture, AGCT-12, Algebraic Geometry, Coding Theory, and Cryptography, March 2009.
- Distinguished Researcher, CRA-W Advanced Career Mentoring Workshop (CAPP), November, 2008, Santa Fe, New Mexico
- AMS meeting, Vancouver, October 2008, Special session on Number Theory
- WIN, Women in Numbers, speaker and project leader, BIRS, Banff, November 2008.
- Pairing08, 2 talks, Royal Holloway, London, September 2008
- C4: Computations on Curves for Cryptography and Coding, Paris, June, 2008.
- MSR/INRIA Joint Center, talk on Cryptographic Hash Functions, Paris, June 2008
- IML Institut de Mathematiques de Luminy, Marseille, May 2008 (2 talks)
- University of Chicago, Colloquium and Number Theory Seminar, September 2007
- Invited Speaker, 4th Spring Conference on Siegel Modular Forms and Abelian Varieties, Hamana Lake, Japan, February 2007. Slides
- 2nd NIST Hash Function Workshop Cryptographic Hash Functions from Expander Graphs, August, 2006. slides
- Invited talk, Inaugural ITA Information Theory and Applications conference, UCSD, February 2006, slides
- CISS06 Talk by Denis Charles Slides
- PKC2006 Talk by Anton Mityagin Slides
- SAGE Days 1 Conference, UCSD, February 2006. Slides
- Invited Speaker, Intersection of Arithmetic Cycles and Automorphic Forms, CRM Montreal, December, 2005. Slides
- NIST Hash Function Workshop, Talk by Josh Benaloh, NIST Gaithersburg, MD, October, 2005 slides
Selected past invited talks
Older talks…to be completed:
ANTS II: Algorithmic Number Theory Symposium, Universite de Bordeaux, May 20, 1996.
Oberwolfach Meeting on Finite Fields, Oberwolfach, Germany, January 20, 1997.
Connecticut Valley Undergraduate Colloquium Series, UMass, Amherst, April 23, 1997.
AGCT-6: Arithmetic, Geometry, and Coding Theory, C.I.R.M. Luminy, France, June 24, 1997.
AMS Summer Research Conference, Applications of Curves over Finite Fields, Seattle, 1997.
European Research Conference, Number Theory and Arithmetical Geometry, Spain, Oct 1997.
ICCC: 2nd International Conference on Coding Theory and Cryptography, Mexico, April, 1998.
AMS Fall Western Section Meeting, Tucson, Arizona, November 14-15, 1998
Oberwolfach Meeting on Explicit Methods in Number Theory, Oberwolfach, July, 1999.
AGCT-7: Arithmetic, Geometry, and Coding Theory, October, 1999, C.I.R.M., Luminy, France
Workshop on Unusual Applications of Number Theory, 10-14 January 2000, DIMACS
AMS Western Section Regional Meeting, Invited Address, October, 2000, San Francisco
MSRI Workshop on Number Theory, Genus three curves over finite fields October, 2000
Sixth Pacific North West Number Theory Conference Vancouver, March 2002.
IPAM New Trends in Cryptography, April 2002
University of Michigan Undergraduate Colloquium, April 2002
High Primes and Misdemeanours, Lectures in honour of Hugh Williams, Banff 2003
Pacific Northwest Number Theory Conference, Vancouver, April 2004
BIRS Workshop: Explicit Methods in Number Theory, November, 2004
BIRS Workshop Number Theory Inspired by Cryptography November, 2005.
- ACM Cloud Computing Security Workshop (CCSW)
- Workshop on Elliptic Curve Cryptography (ECC)
- Women In Numbers Network (WIN)
- SAC 2013: Selected Areas in Cryptography 2013, 20th Anniversary! Proceedings
- LatinCrypt 2015 Guadalajara, Mexico, August 23rd to 26th, 2015 Proceedings
- IPAM Workshop on Algebraic Geometry for Coding Theory and Cryptography, February 22-26, 2016 (Research Collaboration Conference, for men and women! ~43% female) Blog Post: IPAMania!
- Dagstuhl Seminar: Modern Cryptography and Security: An Inter-Community Dialogue, January 31 – February 5 , 2016, Dagstuhl Seminar 16051. An innovative interactive format.
- ICERM Workshop: Modular Forms and Curves of Low Genus: Computational Aspects, September 28 – October 2, 2015 (~30% Female Invited Speakers!)
- AWM Workshop in Number Theory, Joint Mathematical Meetings, San Diego 2013
- Workshop on Applied Homomorphic Cryptography, Financial Crypto, April, 2013
- Conference on Algebraic Informatics, Sept 3-6, 2013
- Foundations of Computational Mathematics, Montevideo, Uruguay, December, 2014
- ANTS 10 10th Algorithmic Number Theory Symposium, San Diego, July 2012
- AWM Association for Women in Mathematics 40th Anniversary Conference, Brown University, September 2011
- SIAM Conference on Applied Algebraic Geometry, UNC, October 2011
- ECC 2010, 25th anniversary of Elliptic Curve Cryptography, MSR, October 2010
- Computer Security and Cryptography, CRM, Montreal, April 12-16, 2010
- Cryptography Retrospective, Fields Institute, Toronto, May 2009
- WIN: Women in Numbers, Banff International Research Station, November 2008
- AMS Special Session on Low Genus Curves, San Diego, January 2008
- 10th Annual Pacific Northwest Number Theory Conference, MSR/DigiPen, Feb 2006
- IPAM Workshop on Number Theory and Cryptography – Open Problems, Oct. 2006
- AMS Special Session on Computational Arithmetic Geometry, April 2006
- 5th Pacific Northwest Number Theory Conference, MSR/DigiPen, April 2001
- AMS Special Session on Low Genus Curves and Applications, October 2000
In The News
Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data | CardRates | January 31, 2019
From the NSA to Silicon Valley, a new kind of encryption is going commercial | cyberscoop | January 22, 2019
Intel, Microsoft Push Homomorphic Encryption with Open-Source Moves | Toolbox | January 10, 2019
Microsoft Open Sources Homomorphic Encryption Library “SEAL” | Computer Business Review | January 2, 2019
SEAL up your data just like Microsoft: Redmond open-sources ‘simple’ homomorphic encryption blueprints | The Register | December 4, 2018
Microsoft Open Sources SEAL Homomorphic Encryption Library | Decipher | December 3, 2018
Microsoft SEAL Arrives as Simple and Efficient Homomorphic Encryption Solution | WinBuzzer | December 3, 2018
HE-Transformer for nGraph: Enabling Deep Learning on Encrypted Data | Intel AI | December 3, 2018
The Future of Cryptography | Queen Elizabeth Prize for Engineering | August 2018
Microsoft researchers smash homomorphic encryption speed barrier | The Register | February 2016
Microsoft boffins build better crypto for secure medical data crunching | The Register | November 2015
Microsoft helps out healthcare sector with new data encryption algorithm | SoftPedia News | November 2015
Core Concept: Homomorphic encryption PNAS | July 2015
Kristin Lauter on cryptography and mathematics | XRDS/ACM Crossroads | March 2015
Cryptographer’s challenge: Keeping genetic secrets while advancing genetic research | Microsoft Research Blog | March 2015
New Community Challenge Seeks to Evaluate Methods of Computing on Encrypted Genomic Data | genome web | November 2014
A Cipher for Your Genome | GeneWatch | January – April 2014
How to Hide Your Genome | Science News | February 2014
Your Genome: to share or not to share | AAAS News | February 2014
AAAS Newsroom Panel: Live demo (minutes 12-15) | EurekAlert! | February 2014
Keep Your Genetic Data Secure | PlanetSave | February 2014
Big Data, Big Changes | Perfectly Awkward Science | May 2014
Cryptographic hash functions
Cryptographic cloud storage
Considerations for the Cryptographic Cloud | HPC in the Cloud | 2010
Security in the Cloud | Communications of the ACM | November 2010
Practical somewhat homomorphic encryption
Alice and Bob in Cipherspace | Brian Hayes of American Scientist | September 2012
A Cloud that Can’t Leak | Tom Simonite of Technology Review | August 2011
Mehr Sicherheit für Datenwolke | Tom Simonite, Niels Boeing of Technology Review | August 2011
Women in math
First Woman Fields Medalist | UPI | August 2014
PhD+epsilon | Conference diaries: Women in Numbers | Europe AMS | October 30, 2013
PhD+epsilon | Sage Days 50 – Women in Sage | AMS | July 2013
PhD+Epsilon | Women In SAGE 3 | AMS | July 2012
WIN2 2011 Women In Numbers | Asian Pacific Mathematics Newsletter | January 2012
PhD+epsilon | AWM 40th Anniversary Conference | AMS blog | October 2011
WIN 2008 Women In Numbers Conference | Fields Institute Newsletter | January 2009
First Woman Ever Wins Math’s ‘Nobel Prize’ | UPI | August 2014
Microsoft Research’s Lauter Named Next AWM President | Microsoft Research Blog | January 2014
Alice and Bob in Cipherspace | American Scientist | September – October 2012
Top Researchers Inspire Interns | Microsoft Research Blog | August 2011
A Cloud That Can’t Leak | MIT Technology Review | August 2011
Security in the Cloud | Communications of the ACM | November 2010
Searching an Encrypted Cloud | MIT Technology Review | November 2009