Loading...
The system can't perform the operation now. Try again later.
Articles
Case law
Profiles
My profile
My library
Metrics
Alerts
Settings
Get journal articles
Get journal articles
Profiles
My profile
My library
Yu Xia
Ph.D. Student, Massachusetts Institute of Technology
Verified email at mit.edu
Cited by 1419
Distributed System
Database
Artificial Intelligence
Theoretical Cryptography
Zengpeng Li
Shandong University
Verified email at email.sdu.edu.cn
Cited by 903
Theoretical Cryptography
Applied Cryptography
Secure Multiparty Computing
Distributed Computing
Nils Fleischhacker
Assistant Professor, Ruhr University Bochum
Verified email at rub.de
Cited by 555
Theoretical Cryptography
Provable Security
Alexander R. Block
Department of Computer Science, University of Illinois at Chicago
Verified email at uic.edu
Cited by 231
Efficient Proof and Argument Systems
Theoretical Cryptography
Coding Theory
Gabrielle Beck
PhD Student, Johns Hopkins University
Verified email at cs.jhu.edu
Cited by 199
Applied Cryptography
Theoretical Cryptography
Dr. Subrata Nandi
Research Scholar, IIT Guwahati
Verified email at iitg.ac.in
Cited by 113
Theoretical Cryptography
Lalita Devadas
PhD Student, MIT
Verified email at mit.edu
Cited by 92
theoretical cryptography
Eleanor McMurtry
ETH Zurich
Verified email at inf.ethz.ch
Cited by 65
Theoretical Cryptography
Applied Cryptography
Jeffrey Champion
PhD Student, UT Austin
Verified email at utexas.edu
Cited by 43
theoretical cryptography
Surya Mathialagan
Graduate Student in EECS, MIT
Verified email at mit.edu
Cited by 36
Theoretical Cryptography
Combinatorics
Graph Algorithms
Fine-grained Complexity
1 - 10
Privacy
Terms
Help
About Scholar
Search help