Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Pratyay MukherjeeSupra OraclesVerified email at supraoracles.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Antigoni PolychroniadouCryptography Research Lead, JPMorgan AI ResearchVerified email at cornell.edu
payman mohasselPrivacy at FacebookVerified email at fb.com
Shashank AgrawalVisa ResearchVerified email at visa.com
Chongwon ChoStealth Software Technologies Inc.Verified email at ucla.edu
Jingcheng LiuNanjing UniversityVerified email at nju.edu.cn
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Ian MiersUniversity of MarylandVerified email at umd.edu
Alessandro ChiesaEPFLVerified email at epfl.ch
Pratyush MishraUC BerkeleyVerified email at berkeley.edu
Marvin KünnemannPostdoc at Max Planck Institute for Informatics, Saarbrücken, GermanyVerified email at mpi-inf.mpg.de
Akshayaram SrinivasanTata Institute of Fundamental ResearchVerified email at tifr.res.in
Karn SethGoogle LLCVerified email at google.com
Mariana RaykovaGoogleVerified email at cs.columbia.edu
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Omkant PandeyStony Brook UniversityVerified email at cs.stonybrook.edu
Martin HoeferProfessor of Computer Science, Goethe University Frankfurt/MainVerified email at cs.uni-frankfurt.de