Issued Patents All Time
Showing 25 most recent of 54 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12045743 | Mixing techniques for probabilistic quantum circuits with fallback | Vadym Kliuchnikov, Adam Edward Paetznick | 2024-07-23 |
| 11431470 | Performing computations on sensitive data while guaranteeing privacy | Xiaoqian Jiang, Miran Kim, Yongsoo Song | 2022-08-30 |
| 11196539 | Multiplication operations on homomorphic encrypted data | Hao Chen, Kim Laine, Gizem Selcan Cetin, Yuhou Xia | 2021-12-07 |
| 11177935 | Homomorphic evaluation of tensor programs | Madanlal Musuvathi, Kim Laine, Hao Chen, Olli Ilari Saarikivi, Saeed Maleki +2 more | 2021-11-16 |
| 11062215 | Using different data sources for a predictive model | Kim Laine, Ran Gilad-Bachrach, Melissa E. Chase, Peter Rindal | 2021-07-13 |
| 10812252 | String matching in encrypted data | Kim Laine, Hao Chen, Gizem Selcan Cetin, Yuhou Xia, Peter Rindal | 2020-10-20 |
| 10430162 | Quantum resource estimates for computing elliptic curve discrete logarithms | Martin Roetteler, Krysta Svore | 2019-10-01 |
| 10296709 | Privacy-preserving genomic prediction | Kim Laine, Nicolo Fusi, Ran Gilad-Bachrach | 2019-05-21 |
| 10211975 | Managed secure computations on encrypted data | Jacob J Loftus, Michael Naehrig, Joppe Willem Bos | 2019-02-19 |
| 10153894 | Homomorphic encryption with optimized encoding | Kim Laine, Nathan Dowlin, Ran Gilad-Bachrach, Michael Naehrig, John Wernsing | 2018-12-11 |
| 10075289 | Homomorphic encryption with optimized parameter selection | Kim Laine, Nathan Dowlin, Ran Gilad-Bachrach, Michael Naehrig, John Wernsing | 2018-09-11 |
| 9900147 | Homomorphic encryption with optimized homomorphic operations | Kim Laine, Nathan Dowlin, Ran Gilad-Bachrach, Michael Naehrig, John Wernsing | 2018-02-20 |
| 9825758 | Secure computer evaluation of k-nearest neighbor models | Tony Feng, David J. Wu, Michael Naehrig | 2017-11-21 |
| 9787647 | Secure computer evaluation of decision trees | David J. Wu, Tony Feng, Michael Naehrig | 2017-10-10 |
| 9524392 | Encrypting genomic data for storage and genomic computations | Michael Naehrig, Adriana Lopez-Alt | 2016-12-20 |
| 9306738 | Managed secure computations on encrypted data | Jacob J Loftus, Michael Naehrig, Joppe Willem Bos | 2016-04-05 |
| 9305018 | Contextual and semantic differential backup | Mathew James Dickson, Samuel James McKelvie, David A. Nichols, John D. Mehr, Elissa E. S. Murphy | 2016-04-05 |
| 9077525 | User-controlled data encryption with obfuscated policy | Nishanth Chandran, Melissa E. Chase, Vinod Vaikuntanathan | 2015-07-07 |
| 8837718 | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store | Mihir Bellare, Josh Benaloh, Melissa E. Chase, Erik J. Horvitz, Chris Demetrios Karkanias | 2014-09-16 |
| 8677135 | Digital signatures with error polynomials | Elisabeth Malmskog, Michael Naehrig, Vinod Vaikuntanathan | 2014-03-18 |
| 8548160 | Determination of pairings on a curve using aggregated inversions | Peter L. Montgomery, Michael Naehrig | 2013-10-01 |
| 8520841 | Algorithms for generating parameters for genus 2 hyperelliptic curve cryptography | Ning Shang | 2013-08-27 |
| 8457305 | Generating genus 2 curves from invariants | Tonghai Yang | 2013-06-04 |
| 8300807 | Computing isogenies between genus-2 curves for cryptography | Reinier M. Broker, David Gruenewald | 2012-10-30 |
| 8259932 | Computing modular polynomials modulo large primes | Denis X. Charles | 2012-09-04 |