Get my own profile
Public access
View all27 articles
1 article
available
not available
Based on funding mandates
Co-authors
Manuel SabinUC BerkeleyVerified email at berkeley.edu
Ron RothblumTechnionVerified email at cs.technion.ac.il
Marshall BallNew York UniversityVerified email at nyu.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Akshayaram SrinivasanUniversity of TorontoVerified email at cs.toronto.edu
Benny applebaumElectrical Engineering School, Tel-Aviv UniversityVerified email at post.tau.ac.il
Ranjit KumaresanVerified email at csail.mit.edu
Pavel RaykovPostdoctoral Researcher, Tel Aviv UniversityVerified email at post.tau.ac.il
Justin ThalerGeorgetown UniversityVerified email at georgetown.edu
Dhiraj HoldenGraduate Student, MITVerified email at mit.edu
Adam BoulandStanford UniversityVerified email at stanford.edu
Lijie ChenUC BerkeleyVerified email at berkeley.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hk
Pasin ManurangsiGoogle ResearchVerified email at google.com
Guy RothblumWeizmann Institute of ScienceVerified email at alum.mit.edu
Adam SealfonGoogle ResearchVerified email at berkeley.edu