[go: up one dir, main page]

Follow
Michael Naehrig
Michael Naehrig
Principal Researcher, Microsoft Research, USA
Verified email at cryptojedi.org - Homepage
Title
Cited by
Cited by
Year
Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy
R Gilad-Bachrach, N Dowlin, K Laine, K Lauter, M Naehrig, J Wernsing
International conference on machine learning, 201-210, 2016
25852016
Can homomorphic encryption be practical?
M Naehrig, K Lauter, V Vaikuntanathan
Proceedings of the 3rd ACM workshop on Cloud computing security workshop …, 2011
16382011
Pairing-friendly elliptic curves of prime order
PSLM Barreto, M Naehrig
International workshop on selected areas in cryptography, 319-331, 2005
14242005
ML confidential: Machine learning on encrypted data
T Graepel, K Lauter, M Naehrig
International conference on information security and cryptology, 1-21, 2012
6852012
Improved security for a ring-based fully homomorphic encryption scheme
JW Bos, K Lauter, J Loftus, M Naehrig
IMA International conference on cryptography and coding, 45-64, 2013
6602013
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
5762016
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem
JW Bos, C Costello, M Naehrig, D Stebila
2015 IEEE symposium on security and privacy, 553-570, 2015
5732015
Elliptic curve cryptography in practice
JW Bos, JA Halderman, N Heninger, J Moore, M Naehrig, E Wustrow
International conference on financial cryptography and data security, 157-175, 2014
4702014
Efficient algorithms for supersingular isogeny Diffie-Hellman
C Costello, P Longa, M Naehrig
Annual international cryptology conference, 572-601, 2016
4132016
Private predictive analysis on encrypted medical data
JW Bos, K Lauter, M Naehrig
Journal of biomedical informatics 50, 234-243, 2014
4082014
Speeding up the number theoretic transform for faster ideal lattice-based cryptography
P Longa, M Naehrig
International Conference on Cryptology and Network Security, 124-139, 2016
3862016
Quantum resource estimates for computing elliptic curve discrete logarithms
M Roetteler, M Naehrig, KM Svore, K Lauter
International Conference on the Theory and Application of Cryptology and …, 2017
3592017
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
3482015
Supersingular isogeny key encapsulation
M Campagna, C Costello, B Hess, A Hutchinson, A Jalali, K Karabina, ...
3322022
Implementing Grover oracles for quantum key search on AES and LowMC
S Jaques, M Naehrig, M Roetteler, F Virdia
Annual International Conference on the Theory and Applications of …, 2020
3172020
A comparison of the homomorphic encryption schemes FV and YASHE
T Lepoint, M Naehrig
International Conference on Cryptology in Africa, 318-335, 2014
2672014
Privately evaluating decision trees and random forests
DJ Wu, T Feng, M Naehrig, K Lauter
Cryptology ePrint Archive, 2015
2522015
Private computation on encrypted genomic data
K Lauter, A López-Alt, M Naehrig
International Conference on Cryptology and Information Security in Latin …, 2014
2512014
Crypto-nets: Neural networks over encrypted data
P Xie, M Bilenko, T Finley, R Gilad-Bachrach, K Lauter, M Naehrig
arXiv preprint arXiv:1412.6181, 2014
2392014
Efficient compression of SIDH public keys
C Costello, D Jao, P Longa, M Naehrig, J Renes, D Urbanik
Annual International Conference on the Theory and Applications of …, 2017
1922017
The system can't perform the operation now. Try again later.
Articles 1–20