Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Justin HolmgrenSimons InstituteVerified email at mit.edu
Ron RothblumTechnionVerified email at cs.technion.ac.il
Alex LombardiPrinceton UniversityVerified email at princeton.edu
Guy RothblumWeizmann Institute of ScienceVerified email at alum.mit.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.fr
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Pratyay MukherjeeSupra ResearchVerified email at supra.com
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Nicholas GeniseApple Inc.Verified email at apple.com
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Fermi MaUC Berkeley & Simons InstituteVerified email at berkeley.edu
Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Qipeng LiuUniversity of California San DiegoVerified email at ucsd.edu
Minki HhanUT AustinVerified email at austin.utexas.edu
Mark ZhandryNTT ResearchVerified email at princeton.edu