Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David SteurerETH ZürichVerified email at inf.ethz.ch
Pravesh K. KothariCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jerry LiMicrosoft ResearchVerified email at mit.edu
Aaron PotechinUniversity of ChicagoVerified email at uchicago.edu
Boaz BarakHarvard UniversityVerified email at boazbarak.org
Ankur MoitraNorbert Wiener Professor of Mathematics, MITVerified email at mit.edu
Yihe DongGoogleVerified email at google.com
Ilias DiakonikolasUniversity of Wisconsin-MadisonVerified email at wisc.edu
Sushrut KarmalkarThe University of Texas at AustinVerified email at cs.utexas.edu
Daniel KaneUniversity of California, San DiegoVerified email at ucsd.edu
Nilesh TripuraneniUC BerkeleyVerified email at berkeley.edu
Yeshwanth CherapanamjeriPh.D Student, UC BerkeleyVerified email at berkeley.edu
Tarun KathuriaPhD student, Computer Science, UC BerkeleyVerified email at berkeley.edu
Fred ZhangUC BerkeleyVerified email at berkeley.edu
Guy BreslerMITVerified email at mit.edu
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Aayush JainNTT Research, Inc.Verified email at cs.ucla.edu
Eric AllenderRutgers UniversityVerified email at cs.rutgers.edu
George DavieUniversity of South AfricaVerified email at unisa.ac.za
Ainesh BakshiCarnegie Mellon UniversityVerified email at cs.cmu.edu