Get my own profile
Public access
View all70 articles
1 article
available
not available
Based on funding mandates
Co-authors
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.frAdriana Lopez-AltNew York UniversityVerified email at cs.nyu.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.comShai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Alex LombardiPrinceton UniversityVerified email at princeton.edu
Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.comBrent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Justin HolmgrenSimons InstituteVerified email at mit.edu
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Ron RothblumTechnionVerified email at cs.technion.ac.il
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Ethan MookNortheastern UniversityVerified email at northeastern.edu
Stefan DziembowskiUniversity of Warsaw and IDEAS InstituteVerified email at mimuw.edu.pl
Pratyay MukherjeeHashgraphVerified email at hashgraph.com
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu