Get my own profile

Public access

View all20 articles

0 articles

available

not available

Based on funding mandates

### Co-authors

- Steven RudichProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Paul BeameProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
- Michael LubyBitRipple and ICSIVerified email at bitripple.com
- Leonid A. LevinVerified email at bu.edu
- Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
- Antonina KolokolovaComputer Science, Memorial University of NewfoundlandVerified email at cs.toronto.edu
- Johan HåstadProfessor i teoretisk datalogi, KTHVerified email at kth.se
- Markus JakobssonFounder/CTO, ZapFraud; Chief Scientist, Stealth companyVerified email at zapfraud-inc.com
- Sam BussProfessor of Mathematics and Computer ScienceVerified email at ucsd.edu
- David ZuckermanProfessor of Computer Science, University of Texas at AustinVerified email at cs.utexas.edu
- Noam NisanProfessor of Computer Science, Hebrew University of JerusalemVerified email at cs.huji.ac.il
- Jeff EdmondsYork UniversityVerified email at cse.yorku.ca
- Stephen CookDepartment of Computer Science, University of TorontoVerified email at cs.toronto.edu
- Eli Ben-SassonCo-founder & President, StarkWareVerified email at starkware.co
- Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
- Stefan SchneiderUniversity of California San DiegoVerified email at eng.ucsd.edu
- Jiri SgallComputer Science Institute of Charles UniversityVerified email at iuuk.mff.cuni.cz
- Matthew CleggGoogle Inc.Verified email at google.com
- Bruce KapronProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
- Ivan MihajlinUCSDVerified email at eng.ucsd.edu