Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Fan ZhangYale UniversityVerified email at yale.edu
Philip DaianPhD Student, Cornell UniversityVerified email at cs.cornell.edu
Ethan CecchettiPostdoc in Computer Science, University of Maryland, College ParkVerified email at umd.edu
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Ahmed KosbaAssistant Professor, Computer and Systems Engineering, Alexandria UniversityVerified email at alexu.edu.eg
Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
Michael MirkinTechnionVerified email at campus.technion.ac.il
Florian TramèrAssistant Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ittay EyalAssociate Professor, ECE, TechnionVerified email at technion.ac.il
Ariah Klages-MundtPhD student, Cornell UniversityVerified email at cornell.edu
Konstantinos Kryptos ChalkiasChief Cryptographer at Mysten Labs, ex-Facebook Cryptography LeadVerified email at mystenlabs.com
Panagiotis ChatzigiannisStaff Research Scientist, Visa ResearchVerified email at visa.com
Follow
