![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Kim Laine
Person information
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Erik Anderson
, Melissa Chase
, F. Betül Durak, Kim Laine
, Chenkai Weng
:
Precio: Private Aggregate Measurement via Oblivious Shuffling. CCS 2024: 1819-1833 - [c20]Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno:
OPTIKS: An Optimized Key Transparency System. USENIX Security Symposium 2024 - [i33]F. Betül Durak, Kim Laine, Simon Langowski, Radames Cruz Moreno:
Sandi: A System for Accountability and Applications in Direct Communication. CoRR abs/2401.16759 (2024) - 2023
- [c19]Pardis Emami Naeini
, Joseph Breda
, Wei Dai
, Tadayoshi Kohno
, Kim Laine
, Shwetak N. Patel
, Franziska Roesner
:
Understanding People's Concerns and Attitudes Toward Smart Cities. CHI 2023: 71:1-71:24 - [i32]David W. Archer, Borja de Balle Pigem, Dan Bogdanov, Mark Craddock, Adrià Gascón, Ronald Jansen, Matjaz Jug, Kim Laine, Robert McLellan, Olga Ohrimenko
, Mariana Raykova, Andrew Trask, Simon Wardley:
UN Handbook on Privacy-Preserving Computation Techniques. CoRR abs/2301.06167 (2023) - [i31]Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine:
Does Prompt-Tuning Language Model Ensure Privacy? CoRR abs/2304.03472 (2023) - [i30]F. Betül Durak, Kim Laine, Simon Langowski, Radames Cruz Moreno, Robert Sim, Shrey Jain:
Sandi: A System for Accountability and Applications in Direct Communication (Extended Abstract). CoRR abs/2311.04861 (2023) - [i29]Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno:
OPTIKS: An Optimized Key Transparency System. IACR Cryptol. ePrint Arch. 2023: 1515 (2023) - 2022
- [i28]C. M. Downey, Wei Dai, Huseyin A. Inan, Kim Laine, Saurabh Naik, Tomasz Religa:
Planting and Mitigating Memorized Content in Predictive-Text Language Models. CoRR abs/2212.08619 (2022) - [i27]Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine:
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery. IACR Cryptol. ePrint Arch. 2022: 1729 (2022) - 2021
- [c18]Sangeeta Chowdhary, Wei Dai
, Kim Laine, Olli Saarikivi:
EVA Improved: Compiler and Extension Library for CKKS. WAHC@CCS 2021: 43-55 - [c17]Kelong Cong
, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai
, Ilia Iliashenko, Kim Laine, Michael Rosenberg
:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. CCS 2021: 1135-1150 - [c16]Nitin Agrawal
, Reuben Binns, Max Van Kleek, Kim Laine, Nigel Shadbolt:
Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation. CHI 2021: 68:1-68:13 - [c15]Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: A New Somewhat Homomorphic Encryption with Reduced Memory Overhead. IMACC 2021: 265-285 - [i26]Nitin Agrawal, Reuben Binns, Max Van Kleek, Kim Laine, Nigel Shadbolt:
Exploring Design and Governance Challenges in the Development of Privacy-Preserving Computation. CoRR abs/2101.08048 (2021) - [i25]Kelong Cong, Radames Cruz Moreno, Mariana Botelho da Gama, Wei Dai, Ilia Iliashenko, Kim Laine, Michael Rosenberg:
Labeled PSI from Homomorphic Encryption with Reduced Computation and Communication. IACR Cryptol. ePrint Arch. 2021: 1116 (2021) - [i24]Erik Anderson, Melissa Chase, F. Betül Durak, Esha Ghosh, Kim Laine, Chenkai Weng:
Aggregate Measurement via Oblivious Shuffling. IACR Cryptol. ePrint Arch. 2021: 1490 (2021) - [i23]Sangeeta Chowdhary, Wei Dai, Kim Laine, Olli Saarikivi:
EVA Improved: Compiler and Extension Library for CKKS. IACR Cryptol. ePrint Arch. 2021: 1505 (2021) - 2020
- [j3]Ahmad Al Badawi
, Louie Hoang, Chan Fook Mun
, Kim Laine
, Khin Mi Mi Aung
:
PrivFT: Private and Fast Text Classification With Homomorphic Encryption. IEEE Access 8: 226544-226556 (2020) - [c14]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai
:
HEAX: An Architecture for Computing on Encrypted Data. ASPLOS 2020: 1295-1309 - [c13]Anamaria Costache, Kim Laine, Rachel Player:
Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE. ESORICS (2) 2020: 546-565 - [c12]Edward J. Chou, Arun Gururajan, Kim Laine, Nitin Kumar Goel, Anna Bertiger, Jack W. Stokes:
Privacy-Preserving Phishing Web Page Classification Via Fully Homomorphic Encryption. ICASSP 2020: 2792-2796 - [c11]Roshan Dathathri, Blagovesta Kostova, Olli Saarikivi, Wei Dai
, Kim Laine, Madan Musuvathi:
EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation. PLDI 2020: 546-561 - [i22]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler
, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020) - [i21]Hao Chen, Ilia Iliashenko, Kim Laine:
When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead. IACR Cryptol. ePrint Arch. 2020: 121 (2020)
2010 – 2019
- 2019
- [c10]Ran Gilad-Bachrach
, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. CCSW 2019: 117-128 - [c9]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: an optimizing compiler for fully-homomorphic neural-network inferencing. PLDI 2019: 142-156 - [c8]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar
:
XONN: XNOR-based Oblivious Deep Neural Network Inference. USENIX Security Symposium 2019: 1501-1518 - [i20]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar:
XONN: XNOR-based Oblivious Deep Neural Network Inference. CoRR abs/1902.07342 (2019) - [i19]Ahmad Al Badawi, Luong Hoang, Chan Fook Mun, Kim Laine, Khin Mi Mi Aung:
PrivFT: Private and Fast Text Classification with Homomorphic Encryption. CoRR abs/1908.06972 (2019) - [i18]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud. CoRR abs/1909.09731 (2019) - [i17]Roshan Dathathri, Blagovesta Kostova, Olli Saarikivi, Wei Dai, Kim Laine, Madanlal Musuvathi:
EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation. CoRR abs/1912.11951 (2019) - [i16]M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E. Lauter, Farinaz Koushanfar
:
XONN: XNOR-based Oblivious Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 171 (2019) - [i15]Anamaria Costache, Kim Laine, Rachel Player:
Homomorphic noise growth in practice: comparing BGV and FV. IACR Cryptol. ePrint Arch. 2019: 493 (2019) - [i14]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i13]M. Sadegh Riazi, Kim Laine, Blake Pelton, Wei Dai:
HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud. IACR Cryptol. ePrint Arch. 2019: 1066 (2019) - 2018
- [c7]Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. CCS 2018: 1223-1237 - [c6]Roger A. Hallman
, Kim Laine, Wei Dai, Nicolas Gama, Alex J. Malozemoff, Yuriy Polyakov
, Sergiu Carpov
:
Building Applications with Homomorphic Encryption. CCS 2018: 2160-2162 - [c5]Hao Chen, Kim Laine, Rachel Player, Yuhou Xia
:
High-Precision Arithmetic in Homomorphic Encryption. CT-RSA 2018: 116-136 - [c4]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with Compressed Queries and Amortized Query Processing. IEEE Symposium on Security and Privacy 2018: 962-979 - [i12]Roshan Dathathri, Olli Saarikivi, Hao Chen, Kim Laine, Kristin E. Lauter, Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
CHET: Compiler and Runtime for Homomorphic Evaluation of Tensor Programs. CoRR abs/1810.00845 (2018) - [i11]Hao Chen, Ran Gilad-Bachrach, Kyoohyung Han, Zhicong Huang, Amir Jalali, Kim Laine, Kristin E. Lauter:
Logistic regression over encrypted data from fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2018: 462 (2018) - [i10]Hao Chen, Zhicong Huang, Kim Laine, Peter Rindal:
Labeled PSI from Fully Homomorphic Encryption with Malicious Security. IACR Cryptol. ePrint Arch. 2018: 787 (2018) - 2017
- [j2]Nathan Dowlin, Ran Gilad-Bachrach
, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
Manual for Using Homomorphic Encryption for Bioinformatics. Proc. IEEE 105(3): 552-567 (2017) - [c3]Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. CCS 2017: 1243-1255 - [c2]Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. Financial Cryptography Workshops 2017: 3-18 - [i9]Gizem S. Çetin, Hao Chen, Kim Laine, Kristin E. Lauter, Peter Rindal, Yuhou Xia:
Private Queries on Encrypted Genomic Data. IACR Cryptol. ePrint Arch. 2017: 207 (2017) - [i8]Hao Chen, Kim Laine, Rachel Player:
Simple Encrypted Arithmetic Library - SEAL v2.1. IACR Cryptol. ePrint Arch. 2017: 224 (2017) - [i7]Hao Chen, Kim Laine, Peter Rindal:
Fast Private Set Intersection from Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 299 (2017) - [i6]Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal:
Private Collaborative Neural Network Learning. IACR Cryptol. ePrint Arch. 2017: 762 (2017) - [i5]Hao Chen, Kim Laine, Rachel Player, Yuhou Xia:
High-Precision Arithmetic in Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 809 (2017) - [i4]Sebastian Angel, Hao Chen, Kim Laine, Srinath T. V. Setty:
PIR with compressed queries and amortized query processing. IACR Cryptol. ePrint Arch. 2017: 1142 (2017) - 2016
- [c1]Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, John Wernsing:
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. ICML 2016: 201-210 - [i3]Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. IACR Cryptol. ePrint Arch. 2016: 620 (2016) - 2015
- [j1]Kim Laine, Kristin E. Lauter:
Time-memory trade-offs for index calculus in genus 3. J. Math. Cryptol. 9(2): 95-114 (2015) - [i2]Kim Laine, Kristin E. Lauter:
Key Recovery for LWE in Polynomial Time. IACR Cryptol. ePrint Arch. 2015: 176 (2015) - 2014
- [i1]Kim Laine, Kristin E. Lauter:
Time-Memory Trade-offs for Index Calculus in Genus 3. IACR Cryptol. ePrint Arch. 2014: 346 (2014)
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint