Get my own profile
Public access
View all13 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
Gerard RyanNew Jersey Institute of TechnologyVerified email at njit.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
Partha PalBBN TechnologiesVerified email at raytheon.com
Tamer BaşarSwanlund Endowed Chair Emeritus & CAS Professor Emeritus of ECE, University of IllinoisVerified email at illinois.edu
Giovanni Di CrescenzoPeraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCoreVerified email at appcomsci.com
Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Kamil Doruk GürPhD student, University of MarylandVerified email at umd.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Daniele MicciancioProfessor of computer science, UCSDVerified email at eng.ucsd.edu
Hadi SajjadpourPhD student, New Jersey Institute of TechnologyVerified email at njit.edu
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
GYANA SAHUNew Jersey Institute of TechnologyVerified email at njit.edu
Mike DeanPrincipal Engineer, Raytheon BBN TechnologiesVerified email at bbn.com
Alex J. MalozemoffGaloisVerified email at galois.com
Tae-Sic YooDistinguished Research Scientist, Idaho National LaboratoryVerified email at inl.gov