Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Justin HolmgrenSimons InstituteVerified email at mit.edu
- Ron RothblumTechnionVerified email at cs.technion.ac.il
- Alex LombardiPrinceton UniversityVerified email at princeton.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.fr
- Guy RothblumWeizmann Institute of ScienceVerified email at alum.mit.edu
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
- Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
- Mariana RaykovaGoogleVerified email at cs.columbia.edu
- Craig GentryChief Scientist, CornamiVerified email at cornami.com
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Nicholas GeniseApple Inc.Verified email at apple.com
- Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
- Fermi MaUC Berkeley & Simons InstituteVerified email at berkeley.edu
- Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Qipeng LiuUniversity of California San DiegoVerified email at ucsd.edu
- Minki HhanUT AustinVerified email at austin.utexas.edu
- Mark ZhandryNTT ResearchVerified email at princeton.edu