Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Profiles
My profile
My library
Yu Xia
Ph.D. Student, Massachusetts Institute of Technology
Verified email at mit.edu
Cited by 1426
Distributed System
Database
Artificial Intelligence
Theoretical Cryptography
Zengpeng Li
Shandong University
Verified email at email.sdu.edu.cn
Cited by 918
Theoretical Cryptography
Applied Cryptography
Secure Multiparty Computing
Distributed Computing
Nils Fleischhacker
Assistant Professor, Ruhr University Bochum
Verified email at rub.de
Cited by 565
Theoretical Cryptography
Provable Security
Alexander R. Block
Department of Computer Science, University of Illinois at Chicago
Verified email at uic.edu
Cited by 249
Efficient Proof and Argument Systems
Theoretical Cryptography
Coding Theory
Gabrielle Beck
PhD Student, Johns Hopkins University
Verified email at cs.jhu.edu
Cited by 204
Applied Cryptography
Theoretical Cryptography
Dr. Subrata Nandi
Research Scholar, IIT Guwahati
Verified email at iitg.ac.in
Cited by 111
Theoretical Cryptography
Lalita Devadas
PhD Student, MIT
Verified email at mit.edu
Cited by 95
theoretical cryptography
Eleanor McMurtry
ETH Zurich
Verified email at inf.ethz.ch
Cited by 68
Theoretical Cryptography
Applied Cryptography
Surya Mathialagan
Graduate Student in EECS, MIT
Verified email at mit.edu
Cited by 46
Theoretical Cryptography
Combinatorics
Graph Algorithms
Fine-grained Complexity
Jeffrey Champion
PhD Student, UT Austin
Verified email at utexas.edu
Cited by 46
theoretical cryptography
1 - 10
Privacy
Terms
Help
About Scholar
Search help