Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Nishanth ChandranPrincipal Researcher, Microsoft Research, IndiaVerified email at microsoft.com
Divya GuptaPrincipal Researcher, Microsoft Research IndiaVerified email at microsoft.com
Paul CuffRenaissance TechnologiesVerified email at rentec.com
Dragos RotaruZamaVerified email at zama.ai
Tal RabinIBM ResearchVerified email at us.ibm.com
Shruti TopleMicrosoft ResearchVerified email at microsoft.com
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org
Eyal KushilevitzComputer Science Department, TechnionVerified email at cs.technion.ac.il
Liwei SongPhD Student, Princeton UniversityVerified email at princeton.edu
David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
Yongsoo SongSeoul National UniversityVerified email at snu.ac.kr
Raluca Ada PopaProfessor of computer science, UC BerkeleyVerified email at berkeley.edu
Hao ChenFacebookVerified email at fb.com
Ilya RazenshteynCipherMode LabsVerified email at mit.edu
Miran KimAssistant Professor at the Department of Mathematics, Hanyang UniversityVerified email at hanyang.ac.kr
David WentzlaffAssociate Professor of Electrical Engineering, Princeton UniversityVerified email at princeton.edu
Yanqi ZhouGoogleVerified email at google.com
Ashwin MachanavajjhalaAssociate Professor, Duke UniversityVerified email at cs.duke.edu
Xi HeUniversity of WaterlooVerified email at uwaterloo.ca