Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Pratyay MukherjeeSupra ResearchVerified email at supra.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Siyao GUONYU ShanghaiVerified email at nyu.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hk
Silas RichelsonProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Gaven WatsonMetaVerified email at meta.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Peter RindalVisa ReseachVerified email at visa.com
James BartusekNYUVerified email at nyu.edu
Rouzbeh BehniaUniversity of South FloridaVerified email at usf.edu
Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it