Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Martijn StamSenior Researcher at Simula UiB, NorwayEmail verificata su simula.no
- Luke MatherResearcher in Applied Cryptography, University of BristolEmail verificata su bristol.ac.uk
- Jonathan O'ConnellResearch Assistant in Cryptography, University of BristolEmail verificata su bris.ac.uk
- Jake LongoUniversity of BristolEmail verificata su bristol.ac.uk
- Dan PageComputer Science, University of BristolEmail verificata su cs.bris.ac.uk
- Michael TunstallCryptography ResearchEmail verificata su cryptography.com
- Tomasz KociumakaMax Planck Institute for Informatics, Saarland Informatics CampusEmail verificata su mpi-inf.mpg.de
- Paweł GawrychowskiUniversity of WrocławEmail verificata su cs.uni.wroc.pl
- Przemysław UznańskiPathwayEmail verificata su pathway.com
- Raphael CliffordUniversity of BristolEmail verificata su cs.bris.ac.uk
- Marcin WójcikEmail verificata su cam.ac.uk
- Ashley MontanaroUniversity of BristolEmail verificata su bristol.ac.uk
- Gareth T. DaviesNXP SemiconductorsEmail verificata su nxp.com
- Christian JansonResearch Group Leader, Technische Universität Darmstadt (TU Darmstadt), GermanyEmail verificata su tu-darmstadt.de