Get my own profile
Public access
View all24 articles
1 article
available
not available
Based on funding mandates
Co-authors
Kostas Kryptos ChalkiasChief Cryptographer at Mysten Labs, ex-Facebook Cryptography LeadVerified email at mystenlabs.com
Alessandra ScafuroNorth Carolina State UniversityVerified email at ncsu.edu
Sharon GoldbergComputer Science, Boston UniversityVerified email at cs.bu.edu
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Panagiotis ChatzigiannisResearch Scientist, Visa ResearchVerified email at visa.com
Ethan HeilmanBoston University, CloudflareVerified email at bu.edu
Dimitris Hristu-VarsakelisUniversity of MacedoniaVerified email at uom.edu.gr
Ioanna KarantaidouPostdoctoral researcherVerified email at nyu.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Jan CamenischDFINITYVerified email at dfinity.org
Andy RuppUniversity of LuxembourgVerified email at rub.de
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Jiasun LiGeorge Mason UniversityVerified email at gmu.edu
Varun MadathilPostdoctoral Associate, Yale UniversityVerified email at ncsu.edu
Thomas ZachariasUniversity of GlasgowVerified email at glasgow.ac.uk
Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cn
Follow