Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arpita PatraAssociate Professor, Dept. of Computer Science & Automation, Indian Institute of ScienceVerified email at iisc.ac.in
Xiao WangNorthwestern UniversityVerified email at northwestern.edu
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Sarbajit MukherjeePhd Student, Utah State UniversityVerified email at aggiemail.usu.edu
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Divya RaviUniversity of Amsterdam, NetherlandsVerified email at uva.nl
Chaya GaneshIndian Institute of ScienceVerified email at iisc.ac.in
Chenkai WengArizona State UniversityVerified email at asu.edu
Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
Saikrishna BadrinarayananStaff Applied Researcher, LinkedInVerified email at linkedin.com
Dimitris MourisNillionVerified email at nillion.com
Nektarios Georgios TsoutsosAssistant Professor, University of DelawareVerified email at udel.edu
Ajith SureshTechnology Innovation Institute (TII), Abu DhabiVerified email at tii.ae
Suvradip ChakrabortyResearch Scientist @Visa ResearchVerified email at visa.com
Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
Yashvanth KondiSilence Laboratories (employed by Deel)Verified email at silencelaboratories.com
Ashish ChoudhuryIIIT BangaloreVerified email at iiitb.ac.in
Gayathri GarimellaOregon State UniversityVerified email at oregonstate.edu
Daniel MasnyMetaVerified email at fb.com
Srinivasan RaghuramanVisa ResearchVerified email at visa.com