Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Daniel TschudiConcordiumVerified email at concordium.com
- Christian MattPrimevVerified email at primev.xyz
- Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
- Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
- Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
- Craig GentryChief Scientist, CornamiVerified email at cornami.com
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
- Adithya BhatStaff Research Scientist at Visa ResearchVerified email at visa.com
- Antonio FaonioEURECOMVerified email at eurecom.fr
- Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
- Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
- Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
- Lucjan HanzlikCISPA, Saarland University, Saarland Informatics CampusVerified email at cispa.saarland