Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Adam SmithProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Shabsi WalfishGoogleVerified email at cs.nyu.edu
Rafail OstrovskyNorman E. Friedman Chair Distinguished Professor of CS and MathematicsVerified email at cs.ucla.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Tal RabinIBM ResearchVerified email at us.ibm.com
Nelly FazioAssociate Professor, City College & Graduate Center of CUNYVerified email at cs.ccny.cuny.edu
Sandro CorettiIOHKVerified email at iohk.io
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Richard ColeProfessor of Computer Science, Courant Institute, New York UniversityVerified email at cs.nyu.edu
Tim RoughgardenColumbia UniversityVerified email at cs.columbia.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Salil VadhanVicky Joseph Professor of Computer Science and Applied Mathematics, Harvard UniversityVerified email at g.harvard.edu