Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Damien StehléENS de LyonVerified email at ens-lyon.fr
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Daniele MicciancioProfessor of computer science, UCSDVerified email at eng.ucsd.edu
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Oded RegevProfessor of Computer ScienceVerified email at cims.nyu.edu
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Thomas PrestPQShieldVerified email at pqshield.com
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Ngoc Khanh NguyenIBM Research Zurich and ETH ZurichVerified email at zurich.ibm.com
Gregory NevenDFINITYVerified email at dfinity.org
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Alon RosenBocconi UniversityVerified email at unibocconi.it
Alain DurmusENS Paris-SaclayVerified email at ens-paris-saclay.fr
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Carsten BaumAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
zhenfei zhangEthereum FoundationVerified email at ethereum.org