Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Verified email at cse.iitm.ac.in
- Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Manoj PrabhakaranComputer Science and Engineering, IIT BombayVerified email at cse.iitb.ac.in
- Srinivasan RaghuramanVisa ResearchVerified email at visa.com
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
- Michelle X. YeoIST AustriaVerified email at uchicago.edu
- Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
- Harish KarthikeyanJ.P Morgan AI ResearchVerified email at jpmchase.com
- Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaVerified email at ra.ac.ae
- Chaya GaneshIndian Institute of ScienceVerified email at iisc.ac.in
- Pratik SarkarSupra ResearchVerified email at supraoracles.com
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
- Sreenivasa Rao YNIT WarangalVerified email at nitw.ac.in
- Kunwar SinghCSE Deapartment, NIT TrichyVerified email at nitt.edu
- Mahak PancholiAarhus UniversityVerified email at cs.au.dk
- Guillermo Pascual-PerezISTAVerified email at ist.ac.at
- Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch