Back to Results
First PageMeta Content
Lattice-based cryptography / Homomorphic encryption / Symposium on Theory of Computing / International Cryptology Conference / Symposium on Foundations of Computer Science / Asiacrypt / Oblivious transfer / Eurocrypt / Indocrypt / Cryptography / Formal sciences / Post-quantum cryptography


Vinod Vaikuntanathan Curriculum Vitae Date of Revision:May 2, 2013 A BIOGRAPHICAL INFORMATION A.1
Add to Reading List

Document Date: 2013-05-02 00:24:31


Open Document

File Size: 204,08 KB

Share Result on Facebook

City

Porto / Kolkata / Hawthorne / Houston / Tel-Aviv / Mathematical Cryptology / Toronto / Optimal Password / Palm Springs / Taormina / Lattice / Okinawa / Efficient Password / Boston / New York / Daejeon / Trivandrum / Cambridge / /

Company

CSC / Microsoft Corporation / IBM Corporation / Akamai / SRI International / Synchronous Networks / /

Country

Japan / Canada / Portugal / United Kingdom / India / Barbados / Italy / United States / South Korea / /

Currency

USD / CAD / pence / /

/

Facility

Watson Research Center / Cryptography University of Toronto Computer Science Colloquium / University of Washington Computer Science Colloquium / Indian Institute of Technology / University Theory Seminar / Weizmann Institute of Science Theory Seminar / University of Toronto Theory Seminar / Isaac Newton Institute / University of Toronto / University of Rochester Computer Science Colloquium / Massachusetts Institute of Technology / /

OperatingSystem

L3 / /

Organization

Columbia University / Errors Penn State Summer School on Cryptography and Software Security / University of Toronto / Toronto / Isaac Newton Institute / Princeton University / Massachusetts Institute of Technology / University of Rochester / Cornell University / UCSD / Princeton Center for Computational Intractability Seminar / NYU / Indian Institute of Technology / University of Washington Computer Science Colloquium / Rutgers / Cryptography University / MIT Cryptography / Memory Attacks Princeton Center for Information Technology Policy / Summer School on Lattices / Weizmann Institute of Science Theory Seminar / Indian Institute of Technology / Madras / University of Wisconsin / Technion / Stanford / /

Person

Panagiotis Voulgaris / Eran Tromer / Hoeteck Wee / Ronald Cramer / Kristin Lauter / Hideki Imai / Josef Raviv Postdoctoral / Andrew Putnam / Rajiv Gandhi / Shai Halevi / Brent Waters / Abhi Shelat / Dana Dachman-Soled / Nishanth Chandran / Joseph Raviv Postdoctoral / David Mandell Freeman / Xavier Boyen / Kannan Srinathan / Dov Gordon / Chris Peikert / Redmond Cryptography / Faith Ellen / Amitanand Aiyer / Guy Rothblum / Omkant Pandey / Arvind Narayanan / George M. Sprowls / Hao Chen / Rotem Oshman / Donnell Vaikuntanathan / C. Pandurangan / Raluca Ada Popa / Craig Gentry / Alfred P. Sloan / Vinod Vaikuntanathan / V. Vinod / Seny Kamara / Toniann Pitassi / Zvika Brakerski / Jonathan Katz / Elan Pavlov / Elisabeth Malmskog / Mariana Raykova / Timothy Sherwood / Sergey Gorbunov / Adriana Lopez-Alt / Eike Kiltz / Rafael Pass / Mark Braverman / Yael Kalai / K. Srinathan / Dan Shumow / Adi Akavia / Sebastian Faust / I. Sanketh / Susan Hohenberger / Leonid Reyzin / Melissa Chase / Nickolai Zeldovich / Ada Popa / Abhishek Jain / Tal Rabin / Marten van Dijk / Daniel Wichs / Dennis Hofheinz / Gilad Asharov / Shafi Goldwasser / Moni Naor / Josh Benaloh / Cynthia Dwork / Michael Ben-Or / Bryan Parno / Yevgeniy Dodis / Shweta Agrawal / Michael Naehrig / /

/

Position

Advisor / Employment Assistant / Professor of Computer Science July / King / Principal Investigator / Researcher / Thesis Advisor / Dean / /

Product

Microsoft Corporation Portable Audio Device / /

ProvinceOrState

New York / California / Ontario / Texas / New Jersey / Wisconsin / Massachusetts / /

PublishedMedium

the Theory of Computing / Cryptology Eprint Archive / the Journal of Cryptology / Journal of Cryptology / the SIAM Journal / Theoretical Computer Science / Theory of Computing / /

Technology

Wee / Functional Encryption / Information Technology / Succinct Functional Encryption / Securely Obfuscating Re-encryption / Attribute-based Encryption / Encryption / Cryptography / 2009 Massachusetts Institute of Technology / User-controlled Data Encryption / Encryption System / Peer-to-Peer / Chord Lookup Protocol / Functional Re-encryption / i-hop Homomorphic Encryption / Public Key / Public-key Encryption / CCA2-Secure Encryption / 2005 Massachusetts Institute of Technology / /

URL

http /

SocialTag