Get my own profile
Public access
View all42 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
- Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Damien StehléCryptoLabVerified email at cryptolab.co.kr
- Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- David CashUniversity of ChicagoVerified email at cs.uchicago.edu
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
- Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
- Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
- John M. SchanckMozilla FirefoxVerified email at mozilla.com
- Kathrin HövelmannsEindhoven University of TechnologyVerified email at hoevelmanns.net
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Dario CatalanoProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it
Follow