Porto / Kolkata / Hawthorne / Houston / Tel-Aviv / Mathematical Cryptology / Toronto / Optimal Password / Palm Springs / Taormina / Lattice / Okinawa / Efficient Password / Boston / New York / Daejeon / Trivandrum / Cambridge / /
Company
CSC / Microsoft Corporation / IBM Corporation / Akamai / SRI International / Synchronous Networks / /
Country
Japan / Canada / Portugal / United Kingdom / India / Barbados / Italy / United States / South Korea / /
Currency
USD / CAD / pence / / /
Facility
Watson Research Center / Cryptography University of Toronto Computer Science Colloquium / University of Washington Computer Science Colloquium / Indian Institute of Technology / University Theory Seminar / Weizmann Institute of Science Theory Seminar / University of Toronto Theory Seminar / Isaac Newton Institute / University of Toronto / University of Rochester Computer Science Colloquium / Massachusetts Institute of Technology / /
OperatingSystem
L3 / /
Organization
Columbia University / Errors Penn State Summer School on Cryptography and Software Security / University of Toronto / Toronto / Isaac Newton Institute / Princeton University / Massachusetts Institute of Technology / University of Rochester / Cornell University / UCSD / Princeton Center for Computational Intractability Seminar / NYU / Indian Institute of Technology / University of Washington Computer Science Colloquium / Rutgers / Cryptography University / MIT Cryptography / Memory Attacks Princeton Center for Information Technology Policy / Summer School on Lattices / Weizmann Institute of Science Theory Seminar / Indian Institute of Technology / Madras / University of Wisconsin / Technion / Stanford / /
Person
Panagiotis Voulgaris / Eran Tromer / Hoeteck Wee / Ronald Cramer / Kristin Lauter / Hideki Imai / Josef Raviv Postdoctoral / Andrew Putnam / Rajiv Gandhi / Shai Halevi / Brent Waters / Abhi Shelat / Dana Dachman-Soled / Nishanth Chandran / Joseph Raviv Postdoctoral / David Mandell Freeman / Xavier Boyen / Kannan Srinathan / Dov Gordon / Chris Peikert / Redmond Cryptography / Faith Ellen / Amitanand Aiyer / Guy Rothblum / Omkant Pandey / Arvind Narayanan / George M. Sprowls / Hao Chen / Rotem Oshman / Donnell Vaikuntanathan / C. Pandurangan / Raluca Ada Popa / Craig Gentry / Alfred P. Sloan / Vinod Vaikuntanathan / V. Vinod / Seny Kamara / Toniann Pitassi / Zvika Brakerski / Jonathan Katz / Elan Pavlov / Elisabeth Malmskog / Mariana Raykova / Timothy Sherwood / Sergey Gorbunov / Adriana Lopez-Alt / Eike Kiltz / Rafael Pass / Mark Braverman / Yael Kalai / K. Srinathan / Dan Shumow / Adi Akavia / Sebastian Faust / I. Sanketh / Susan Hohenberger / Leonid Reyzin / Melissa Chase / Nickolai Zeldovich / Ada Popa / Abhishek Jain / Tal Rabin / Marten van Dijk / Daniel Wichs / Dennis Hofheinz / Gilad Asharov / Shafi Goldwasser / Moni Naor / Josh Benaloh / Cynthia Dwork / Michael Ben-Or / Bryan Parno / Yevgeniy Dodis / Shweta Agrawal / Michael Naehrig / / /
Position
Advisor / Employment Assistant / Professor of Computer Science July / King / Principal Investigator / Researcher / Thesis Advisor / Dean / /
Product
Microsoft Corporation Portable Audio Device / /
ProvinceOrState
New York / California / Ontario / Texas / New Jersey / Wisconsin / Massachusetts / /
PublishedMedium
the Theory of Computing / Cryptology Eprint Archive / the Journal of Cryptology / Journal of Cryptology / the SIAM Journal / Theoretical Computer Science / Theory of Computing / /
Technology
Wee / Functional Encryption / Information Technology / Succinct Functional Encryption / Securely Obfuscating Re-encryption / Attribute-based Encryption / Encryption / Cryptography / 2009 Massachusetts Institute of Technology / User-controlled Data Encryption / Encryption System / Peer-to-Peer / Chord Lookup Protocol / Functional Re-encryption / i-hop Homomorphic Encryption / Public Key / Public-key Encryption / CCA2-Secure Encryption / 2005 Massachusetts Institute of Technology / /