Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Verified email at cse.iitm.ac.in
Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
Manoj PrabhakaranComputer Science and Engineering, IIT BombayVerified email at cse.iitb.ac.in
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Srinivasan RaghuramanVisa ResearchVerified email at visa.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Harish KarthikeyanJ.P Morgan AI ResearchVerified email at jpmchase.com
Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaVerified email at ra.ac.ae
Michelle X. YeoIST AustriaVerified email at uchicago.edu
Chaya GaneshIndian Institute of ScienceVerified email at iisc.ac.in
Pratik SarkarSupra ResearchVerified email at supraoracles.com
Sreenivasa Rao YNIT WarangalVerified email at nitw.ac.in
Kunwar SinghCSE Deapartment, NIT TrichyVerified email at nitt.edu
Guillermo Pascual-PerezISTAVerified email at ist.ac.at
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Mahak PancholiAarhus UniversityVerified email at cs.au.dk
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch