Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sebastian FaustTU DarmstadtEmail verificata su cs.tu-darmstadt.de
- Daniel MalinowskiUniversity of WarsawEmail verificata su crypto.edu.pl
- krzysztof pietrzakProfessor, Cryptography, IST AustriaEmail verificata su ist.ac.at
- Marcin AndrychowiczGoogle BrainEmail verificata su openai.com
- Łukasz MazurekPhD student, Institute of Informatics, University of WarsawEmail verificata su mimuw.edu.pl
- Lisa EckeyEmail verificata su crisp-da.de
- Tomasz Kazanaasystent, Uniwersytet WarszawskiEmail verificata su crypto.edu.pl
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Daniel WichsNortheastern University, Associate ProfessorEmail verificata su ccs.neu.edu
- Ueli MaurerProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Kristina HostákováETH ZürichEmail verificata su inf.ethz.ch
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesEmail verificata su seas.upenn.edu
- Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandEmail verificata su heig-vd.ch
- Vladimir KolmogorovIST AustriaEmail verificata su ist.ac.at
- Maciej ObremskiNational University of SingaporeEmail verificata su nus.edu.sg
- Marcin JurdzińskiUniversity of Warwick, Department of Computer ScienceEmail verificata su warwick.ac.uk
- Ran CanettiProfessor of Computer Science, Boston UniversityEmail verificata su bu.edu
- Tal MalkinProfessor of Computer Science, Columbia UniversityEmail verificata su columbia.edu
- Yuval IshaiTechnionEmail verificata su cs.technion.ac.il
- Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityEmail verificata su labri.fr
Segui