Get my own profile
Public access
View all74 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Huijia (Rachel) LinAssociate Professor at the University of WashingtonVerified email at cs.washington.edu
Chenzhi ZhuUniversity of WashingtonVerified email at cs.washington.edu
Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
Joseph JaegerAssistant Professor, Georgia Institute of TechnologyVerified email at gatech.edu
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Peter GažiIOG ResearchVerified email at iohk.io
Shyam GollakotaProfessor, Allen School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Binyi ChenStanford UniversityVerified email at stanford.edu
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Justin ChanAssistant Professor at Carnegie Mellon UniversityVerified email at cmu.edu
Jonathan LarsonMicrosoft ResearchVerified email at microsoft.com
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Elette BoyleNTT Research & Reichman University (IDC Herzliya)Verified email at mit.edu
Sudheesh SinganamallaNetflix (Previously University of Washington, Cloudflare, Microsoft Research)Verified email at netflix.com
Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraVerified email at cs.ucsb.edu
Victor ZakharyOracleVerified email at oracle.com
Follow
Stefano Tessaro
Professor at the University of Washington
Verified email at cs.washington.edu - Homepage