Get my own profile
Public access
View all66 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.fr
Adriana Lopez-AltNew York UniversityVerified email at cs.nyu.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Alex LombardiPrinceton UniversityVerified email at princeton.edu
Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Justin HolmgrenSimons InstituteVerified email at mit.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Ron RothblumTechnionVerified email at cs.technion.ac.il
Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Pratyay MukherjeeSupra ResearchVerified email at supra.com
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Ryo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com