Get my own profile
Public access
View all62 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Peter GažiIOG ResearchVerified email at iohk.io
Shyam GollakotaProfessor, Allen School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Binyi ChenUC Santa BarbaraVerified email at cs.ucsb.edu
Chenzhi ZhuUniversity of WashingtonVerified email at cs.washington.edu
Justin ChanIncoming Assistant Professor at Carnegie Mellon UniversityVerified email at cmu.edu
Jonathan LarsonMicrosoft ResearchVerified email at microsoft.com
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Sudheesh SinganamallaPhD Candidate, University of WashingtonVerified email at cs.washington.edu
Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Victor ZakharyOracleVerified email at oracle.com
Alexander VardyUniversity of California San DiegoVerified email at ucsd.edu
Ashrujit GhoshalCarnegie Mellon UniversityVerified email at cs.cmu.edu