Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
Luke ValentaCloudflareVerified email at cloudflare.com
Shaanan CohneyUniversity of MelbourneVerified email at unimelb.edu.au
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Emmanuel ThoméINRIA NancyVerified email at inria.fr
Edward W. FeltenRobert E. Kahn Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
Joshua FriedMITVerified email at csail.mit.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
David AdrianUniversity of MichiganVerified email at umich.edu
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Daniel GenkinGeorgia TechVerified email at gatech.edu
Ariel J. FeldmanAssistant Professor of Computer Science, University of ChicagoVerified email at cs.uchicago.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Karthikeyan BhargavanINRIAVerified email at inria.fr
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Daniel MoghimiGoogleVerified email at google.com