Get my own profile
Public access
View all52 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Peter GažiIOHK ResearchVerified email at iohk.io
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Binyi ChenStudent of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Alexander VardyUniversity of California San DiegoVerified email at ucsd.edu
Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Victor ZakharyOracleVerified email at oracle.com
Cetin SahinUniversity of California, Santa BarbaraVerified email at cs.ucsb.edu
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
Elette BoyleVerified email at mit.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de