Portrait of Kristin Lauter

Kristin Lauter

Principal Researcher, Research Manager

In The News

Homomorphic encryption

Microsoft Open-Sources Its SEAL Encryption Technology Allowing Computations on Encrypted Data | CardRates | January 31, 2019

From the NSA to Silicon Valley, a new kind of encryption is going commercial | cyberscoop | January 22, 2019

Intel, Microsoft Push Homomorphic Encryption with Open-Source Moves | Toolbox | January 10, 2019

Microsoft Open Sources Homomorphic Encryption Library “SEAL” | Computer Business Review | January 2, 2019

SEAL up your data just like Microsoft: Redmond open-sources ‘simple’ homomorphic encryption blueprints | The Register | December 4, 2018

Microsoft open sources (SEAL) Simple Encrypted Arithmetic Library 3.1.0, with aims to standardize homomorphic encryption | Packt | December 4, 2018

Microsoft Open Sources SEAL Homomorphic Encryption Library | Decipher | December 3, 2018

Microsoft SEAL Arrives as Simple and Efficient Homomorphic Encryption Solution | WinBuzzer | December 3, 2018

HE-Transformer for nGraph: Enabling Deep Learning on Encrypted Data | Intel AI | December 3, 2018

The Future of Cryptography | Queen Elizabeth Prize for Engineering | August 2018

Microsoft researchers smash homomorphic encryption speed barrierThe Register | February 2016

Microsoft boffins build better crypto for secure medical data crunchingThe Register | November 2015

Microsoft helps out healthcare sector with new data encryption algorithmSoftPedia News | November 2015

Core Concept: Homomorphic encryption PNAS | July 2015

How Apple, Google, and Microsoft approach genetic research and secure DNA data in the cloudSPLINTER | May 2015

Kristin Lauter on cryptography and mathematicsXRDS/ACM Crossroads | March 2015

Cryptographer’s challenge: Keeping genetic secrets while advancing genetic researchMicrosoft Research Blog | March 2015

New Community Challenge Seeks to Evaluate Methods of Computing on Encrypted Genomic Datagenome web | November 2014

Genomic privacy

A Cipher for Your Genome | GeneWatch | January – April 2014

How to Hide Your Genome | Science News | February 2014

Your Genome: to share or not to share | AAAS News | February 2014

AAAS Newsroom Panel: Live demo (minutes 12-15) | EurekAlert! | February 2014

Keep Your Genetic Data Secure | PlanetSave | February 2014

Big Data, Big Changes | Perfectly Awkward Science | May 2014

Cryptographic hash functions

Science | Dana Mackenzie | March 2008

Math in the Media | AMS | March 2008

Cryptographic cloud storage

Searching an Encrypted Cloud | David Talbot of Technology Review | December 2009

Video Interview: The Cryptographic Solution | David Talbot of Technology Review | December 2009

Security in the Ether | David Talbot of Technology Review | December 2009

Considerations for the Cryptographic Cloud | HPC in the Cloud | 2010

Security in the Cloud | Communications of the ACM | November 2010

Practical somewhat homomorphic encryption

Alice and Bob in Cipherspace | Brian Hayes of American Scientist | September 2012

A Cloud that Can’t Leak | Tom Simonite of Technology Review | August 2011

Mehr Sicherheit für Datenwolke | Tom Simonite, Niels Boeing of Technology Review | August 2011

ACM Technews, Twitter posts, Business Week, Orange Business blogs, CloudAve

Women in math

It All Adds Up! Celebration of 150 Years of Women in Mathematics | +plus Magazine | May 26, 2015

First Woman Fields Medalist | UPI | August 2014

AWM President Elect | AWM Newsletter  | March 2014

Conference in Honor of Winnie LiLSU Communications and Media RelationsInterview on Channel 9 WAFB | April 2014

PhD+epsilon | Conference diaries: Women in Numbers | Europe AMS | October 30, 2013

PhD+epsilon | Sage Days 50 – Women in Sage | AMS | July 2013

PhD+Epsilon | Women In SAGE 3 | AMS | July 2012

AWM-Microsoft Research Prize | AWM Newsletter | November 2012

WIN2 2011 Women In Numbers | Asian Pacific Mathematics Newsletter | January 2012

PhD+epsilon | AWM 40th Anniversary Conference | AMS blog | October 2011

WIN 2008 Women In Numbers Conference | Fields Institute Newsletter | January 2009

Other News

First Woman Ever Wins Math’s ‘Nobel Prize’ | UPI | August 2014

Microsoft Research’s Lauter Named Next AWM President | Microsoft Research Blog | January 2014

Alice and Bob in Cipherspace | American Scientist | September – October 2012

Top Researchers Inspire Interns | Microsoft Research Blog | August 2011

A Cloud That Can’t Leak | MIT Technology Review | August 2011

Security in the Cloud | Communications of the ACM | November 2010

Searching an Encrypted Cloud | MIT Technology Review | November 2009