Get my own profile
Public access
View all42 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
- Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
- Gregor SeilerIBM Research EuropeVerified email at posteo.net
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Damien StehléCryptoLabVerified email at cryptolab.co.kr
- Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- David CashUniversity of ChicagoVerified email at cs.uchicago.edu
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
- Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
- John M. SchanckMozilla FirefoxVerified email at mozilla.com
- Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
- Kathrin HövelmannsEindhoven University of TechnologyVerified email at hoevelmanns.net
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Follow