Get my own profile
Public access
View all30 articles
1 article
available
not available
Based on funding mandates
Co-authors
Vipul GoyalCarnegie Mellon UniversityVerified email at cs.cmu.edu
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Prabhanjan AnanthAssistant Professor, UCSBVerified email at cs.ucsb.edu
Arka Rai ChoudhuriPostdoctoral Researcher, UC BerkeleyVerified email at berkeley.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com
Rafail OstrovskyNorman E. Friedman Chair Distinguished Professor of CS and MathematicsVerified email at cs.ucla.edu
Zhengzhong JinJohns Hopkins UniversityVerified email at cs.jhu.edu
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Adriana Lopez-AltNew York UniversityVerified email at cs.nyu.edu
Omkant PandeyStony Brook UniversityVerified email at cs.stonybrook.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Saikrishna BadrinarayananPrivacy Engineer, SnapVerified email at snapchat.com
Omer PanethMITVerified email at mit.edu
Ivan ViscontiUniversity of Salerno, ITALYVerified email at unisa.it
Nir BitanskyTel Aviv UniversityVerified email at tau.ac.il
Dakshita KhuranaUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
Justin HolmgrenSimons InstituteVerified email at mit.edu
Follow