Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at eecs.umich.edu
Luke ValentaCloudflareVerified email at cloudflare.com
Eric WustrowUniversity of Colorado BoulderVerified email at colorado.edu
Shaanan CohneyUniversity of MelbourneVerified email at unimelb.edu.au
Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
Edward W. FeltenRobert E. Kahn Professor of Computer Science and Public Affairs, Princeton UniversityVerified email at princeton.edu
Pierrick GaudryCNRS / INRIA / Université de LorraineVerified email at loria.fr
Emmanuel ThoméINRIA NancyVerified email at inria.fr
David AdrianUniversity of MichiganVerified email at umich.edu
Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Joshua FriedMITVerified email at mit.edu
Ariel J. FeldmanAssistant Professor of Computer Science, University of ChicagoVerified email at cs.uchicago.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel GenkinUniversity of MichiganVerified email at umich.edu
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Karthikeyan BhargavanINRIAVerified email at inria.fr
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Benjamin VanderSlootAssistant Professor, University of Detroit MercyVerified email at udmercy.edu

Nadia Heninger
Verified email at cs.ucsd.edu - Homepage