Get my own profile
Public access
View all44 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Raluca Ada PopaProfessor of computer science, UC BerkeleyVerified email at berkeley.eduDakshita KhuranaUniversity of Illinois Urbana-Champaign, NTT ResearchVerified email at illinois.edu
Ryan LehmkuhlPhD Candidate, MITVerified email at mit.edu
Pratyush MishraAssistant Professor, University of PennsylvaniaVerified email at seas.upenn.edu
Amit SahaiSymantec Chair in Computer Science; Professor of Computer Science and Mathematics, UCLAVerified email at cs.ucla.edu
Wenting ZhengCarnegie Mellon UniversityVerified email at cmu.eduOmkant PandeyStony Brook UniversityVerified email at cs.stonybrook.edu
Mark ZhandryNTT ResearchVerified email at stanford.edu
Pedro BrancoBocconi UniversityVerified email at unibocconi.itPratyay MukherjeeHashgraphVerified email at hashgraph.com
Vipul GoyalNTT ResearchVerified email at vipulgoyal.orgNico DöttlingHelmholtz Center for Information Security (CISPA)Verified email at cispa.de
Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hkPeihan MiaoBrown UniversityVerified email at brown.edu
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Eric MilesGoogleVerified email at google.com
Saikrishna BadrinarayananStaff Applied Researcher, LinkedInVerified email at linkedin.com
James BartusekColumbiaVerified email at columbia.edu