Get my own profile
Public access
View all55 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Peter GažiIOG ResearchVerified email at iohk.io
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Shyam GollakotaProfessor, Allen School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Binyi ChenUC Santa BarbaraVerified email at cs.ucsb.edu
Justin ChanPhD Student at University of WashingtonVerified email at cs.washington.edu
Jonathan LarsonMicrosoft ResearchVerified email at microsoft.com
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Sudheesh SinganamallaPhD Student, University of WashingtonVerified email at cs.washington.edu
Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Victor ZakharyOracleVerified email at oracle.com
Alexander VardyUniversity of California San DiegoVerified email at ucsd.edu
Cetin SahinUniversity of California, Santa BarbaraVerified email at cs.ucsb.edu
David CashUniversity of ChicagoVerified email at cs.uchicago.edu