Get my own profile
Public access
View all48 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyVerified email at simula.no
Ludovic PerretEPITA/LREVerified email at epita.fr
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Amit DeoZamaVerified email at zama.ai
Fernando VirdiaUniversidade NOVA de Lisboa / NOVA LINCSVerified email at campus.fct.unl.pt
Rachel PlayerRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Emmanuela OrsiniBocconi UniversityVerified email at kuleuven.be
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Shi BaiFlorida Atlantic UniversityVerified email at fau.edu
Lorenzo GrassiAssistant Professor at Eindhoven University of Technology (the Netherlands)Verified email at tue.nl
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Alex DavidsonFaculdade de Ciências, Universidade de Lisboa, LASIGEVerified email at fc.ul.pt
Pooya FarshimIOG Research & Durham UniversityVerified email at iohk.io
Daniele MicciancioProfessor of Computer Science, University of California San DiegoVerified email at cs.ucsd.edu
Lenka MarekováApplied Cryptography Group, ETH ZürichVerified email at inf.ethz.ch
Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
Sam ScottCornell TechVerified email at cornell.edu