Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Gregory NevenDFINITYVerified email at dfinity.org
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Vadim LyubashevskyIBM Research - ZurichVerified email at zurich.ibm.com
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Damien StehléENS de LyonVerified email at ens-lyon.fr
Chris PeikertAssociate Professor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
David GalindoAssociate Professor in Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Peter SchwabeProfessor, Radboud University, Nijmegen, The NetherlandsVerified email at cs.ru.nl
Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
Jiaxin PanNTNU – Norwegian University of Science and TechnologyVerified email at ntnu.no
Victor ShoupProfessor of Computer Science, New York UniversityVerified email at cs.nyu.edu
Dario CatalanoProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it
Tadayoshi KohnoProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl