Get my own profile
Public access
View all64 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Adriana Lopez-AltNew York UniversityVerified email at cs.nyu.edu
- Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.fr
- Craig GentryChief Scientist, CornamiVerified email at cornami.com
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Alex LombardiPrinceton UniversityVerified email at princeton.edu
- Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com
- Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
- Mariana RaykovaGoogleVerified email at cs.columbia.edu
- Justin HolmgrenSimons InstituteVerified email at mit.edu
- Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
- Ron RothblumTechnionVerified email at cs.technion.ac.il
- Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
- Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
- Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Ryo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com