Get my own profile
Public access
View all72 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Madhu SudanGordon McKay Professor of Computer Science, Harvard UniversityVerified email at cs.harvard.edu
Atri RudraProfessor, CSE, University at BuffaloVerified email at buffalo.edu
Moses CharikarProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Chaoping XINGShanghai Jiaotong UniversityVerified email at sjtu.edu.cn
Joshua BrakensiekStanford UniversityVerified email at stanford.edu
Johan HåstadProfessor i teoretisk datalogi, KTHVerified email at kth.se
Piotr IndykProfessor of Electrical Engineering and Computer Science, MITVerified email at mit.edu
Euiwoong LeeUniversity of MichiganVerified email at umich.edu
Ali Kemal SinopGoogle ResearchVerified email at google.com
Mahdi CheraghchiUniversity of Michigan, Ann ArborVerified email at umich.edu
C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Verified email at cse.iitm.ac.in
Sanjeev KhannaHenry Salvatori Professor of Computer Science, University of PennsylvaniaVerified email at cis.upenn.edu
Salil VadhanVicky Joseph Professor of Computer Science and Applied Mathematics, Harvard UniversityVerified email at g.harvard.edu
Mary WoottersStanford UniversityVerified email at stanford.edu
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Ray LiStanford UniversityVerified email at stanford.edu
Vijay BhattiproluPrinceton/IASVerified email at math.ias.edu
Yuan ZhouDepartment of ISE, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Yi WuGoogleVerified email at google.com
Anthony WirthProfessor, School of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au