Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
David SteurerETH ZürichVerified email at inf.ethz.ch
Sanjeev AroraProfessor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Oded GoldreichProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Salil VadhanVicky Joseph Professor of Computer Science and Applied Mathematics, Harvard UniversityVerified email at g.harvard.edu
Russell ImpagliazzoUC, San DiegoVerified email at eng.ucsd.edu
Yehuda LindellProfessor of Computer Science, Bar-Ilan UniversityVerified email at biu.ac.il
Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
Steven RudichProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Anup RaoProfessor of Computer Science, University of WashingtonVerified email at cs.washington.edu
Pravesh K. KothariCarnegie Mellon UniversityVerified email at cs.cmu.edu
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Sharon GoldbergComputer Science, Boston UniversityVerified email at cs.bu.edu
Satyen KaleStaff Research Scientist, Google ResearchVerified email at google.com
Ankur MoitraAssociate Professor of Applied Mathematics, MITVerified email at mit.edu
Gal KaplunPhD Student at Harvard UniversityVerified email at g.harvard.edu
Guy KindlerThe Hebrew UniversityVerified email at cs.huji.ac.il
Moritz HardtUniversity of California, BerkeleyVerified email at berkeley.edu
Preetum NakkiranHarvard UniversityVerified email at cs.harvard.edu
Alexander GlaserPrinceton UniversityVerified email at princeton.edu