Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel TschudiConcordiumVerified email at concordium.com
Christian MattConcordiumVerified email at concordium.com
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Adithya BhatPhD Student at Purdue UniversityVerified email at purdue.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Yiannis TselekounisCarnegie Mellon University, Department of Computer ScienceVerified email at cs.cmu.edu
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Hugo KrawczykAmazon Web ServicesVerified email at amazon.com