Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
- David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
- Gerard RyanNew Jersey Institute of TechnologyVerified email at njit.edu
- Stéphane LafortuneProfessor of Electrical Engineering and Computer Science, University of Michigan, USAVerified email at umich.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Erkay SavasSabanci UniversityVerified email at sabanciuniv.edu
- Partha PalBBN TechnologiesVerified email at raytheon.com
- Tamer BaşarSwanlund Endowed Chair Emeritus & CAS Professor Emeritus of ECE, University of IllinoisVerified email at illinois.edu
- Giovanni Di CrescenzoPeraton Labs also formerly known as Applied Communication Sciences, Vencore Labs, BellCoreVerified email at peratonlabs.com
- Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
- Kamil Doruk GürPhD student, University of MarylandVerified email at umd.edu
- Hadi SajjadpourPhD student, New Jersey Institute of TechnologyVerified email at njit.edu
- GYANA SAHUNew Jersey Institute of TechnologyVerified email at njit.edu
- Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
- Alex J. MalozemoffGaloisVerified email at galois.com
- Mike DeanPrincipal Engineer, Raytheon BBN TechnologiesVerified email at bbn.com
- Khin Mi Mi AungResearch Scientist, A*STAR, I2R, SingaporeVerified email at i2r.a-star.edu.sg
- samir khullerBarris Professor and Chair of Computer Science, Northwestern UniversityVerified email at northwestern.edu