Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
Gerard RyanNew Jersey Institute of TechnologyVerified email at njit.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Partha PalBBN TechnologiesVerified email at raytheon.com
Tamer BaşarSwanlund Endowed Chair Emeritus & CAS Professor Emeritus of ECE, University of IllinoisVerified email at illinois.edu
Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
Giovanni Di CrescenzoPeraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCoreVerified email at peratonlabs.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Kamil Doruk GürPhD student, University of MarylandVerified email at umd.edu
Hadi SajjadpourPhD student, New Jersey Institute of TechnologyVerified email at njit.edu
GYANA SAHUNew Jersey Institute of TechnologyVerified email at njit.edu
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Alex J. MalozemoffGaloisVerified email at galois.com
Mike DeanPrincipal Engineer, Raytheon BBN TechnologiesVerified email at bbn.com
Khin Mi Mi AungResearch Scientist, A*STAR, I2R, SingaporeVerified email at i2r.a-star.edu.sg
samir khullerBarris Professor and Chair of Computer Science, Northwestern UniversityVerified email at northwestern.edu