Get my own profile
Public access
View all78 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Akshayaram SrinivasanUniversity of TorontoVerified email at cs.toronto.edu
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Pratyay MukherjeeSupra ResearchVerified email at supra.com
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Omkant PandeyStony Brook UniversityVerified email at cs.stonybrook.edu
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Mark ZhandryNTT ResearchVerified email at princeton.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Saeed MahloujifarFAIR, MetaVerified email at meta.com
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Peihan MiaoBrown UniversityVerified email at brown.edu