Get my own profile
Public access
View all45 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyVerified email at simula.no
Ludovic PerretEPITA/LREVerified email at epita.fr
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Amit DeoZamaVerified email at zama.ai
Fernando VirdiaUniversidade NOVA de Lisboa / NOVA LINCSVerified email at campus.fct.unl.pt
Rachel PlayerRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Shi BaiFlorida Atlantic UniversityVerified email at fau.edu
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Emmanuela OrsiniBocconi UniversityVerified email at kuleuven.be
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Alex DavidsonFaculdade de Ciências, Universidade de Lisboa, LASIGEVerified email at fc.ul.pt
Pooya FarshimIOG Research & Durham UniversityVerified email at iohk.io
Daniele MicciancioProfessor of Computer Science, University of California San DiegoVerified email at cs.ucsd.edu
Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
Sam ScottCornell TechVerified email at cornell.edu
Lenka MarekováApplied Cryptography Group, ETH ZürichVerified email at inf.ethz.ch