Get my own profile
Public access
View all44 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Gregor SeilerIBM Research EuropeVerified email at posteo.net
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Gregory NevenChainlink LabsVerified email at smartcontract.com
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
John M. SchanckMozilla FirefoxVerified email at mozilla.com
Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
Kathrin HövelmannsEindhoven University of TechnologyVerified email at hoevelmanns.net
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Follow