Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
- Nathan ChenetteRose-Hulman Institute of TechnologyVerified email at rose-hulman.edu
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
- George KolliosProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Kobbi NissimDept. of Computer Science (Georgetown)Verified email at georgetown.edu
- Georgios KellarisLerna Inc.Verified email at lerna.ai
- Younho LeeProfessor, IT Management Division, Department of Data Science, SeoulTechVerified email at seoultech.ac.kr
- Craig GentryChief Scientist, CornamiVerified email at cornami.com
- Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
- Dae Hyun YumMyongji UniversityVerified email at mju.ac.kr
- Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
- Vipul GoyalNTT ResearchVerified email at vipulgoyal.org
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
- Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
- Adam SmithProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
- Mohammad ZaheriDept. of Computer Science, Georgetown UniversityVerified email at georgetown.edu
- Serge FehrCWIVerified email at cwi.nl
- payman mohasselPrivacy at FacebookVerified email at fb.com
- Georgios AmanatidisSchool of Mathematics, Statistics and Actuarial Science; University of EssexVerified email at essex.ac.uk