Get my own profile
Public access
View all70 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
- Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
- Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
- Chenzhi ZhuUniversity of WashingtonVerified email at cs.washington.edu
- Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
- Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
- Peter GažiIOG ResearchVerified email at iohk.io
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Shyam GollakotaProfessor, Allen School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
- Binyi ChenStanford UniversityVerified email at stanford.edu
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Justin ChanAssistant Professor at Carnegie Mellon UniversityVerified email at cmu.edu
- Jonathan LarsonMicrosoft ResearchVerified email at microsoft.com
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Sudheesh SinganamallaNetflix (Previously University of Washington, Cloudflare, Microsoft Research)Verified email at netflix.com
- Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
- Victor ZakharyOracleVerified email at oracle.com
- Ashrujit GhoshalCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu