Get my own profile
Public access
View all85 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Amit SahaiSymantec Chair in Computer Science; Professor of Computer Science and Mathematics, UCLAVerified email at cs.ucla.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.comNico DöttlingHelmholtz Center for Information Security (CISPA)Verified email at cispa.de
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Akshayaram SrinivasanUniversity of TorontoVerified email at cs.toronto.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.itPratyay MukherjeeHashgraphVerified email at hashgraph.com
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Omkant PandeyStony Brook UniversityVerified email at cs.stonybrook.edu
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Saeed MahloujifarFAIR, MetaVerified email at meta.com
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Mark ZhandryNTT ResearchVerified email at stanford.edu
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Yuval IshaiTechnionVerified email at cs.technion.ac.ilDaniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu