Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
- Daniel MalinowskiUniversity of WarsawVerified email at crypto.edu.pl
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Marcin AndrychowiczGoogle BrainVerified email at openai.com
- £ukasz MazurekPhD student, Institute of Informatics, University of WarsawVerified email at mimuw.edu.pl
- Tomasz Kazanaasystent, Uniwersytet WarszawskiVerified email at crypto.edu.pl
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Lisa EckeyVerified email at crisp-da.de
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Kristina HostákováETH ZürichVerified email at inf.ethz.ch
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
- Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
- Vladimir KolmogorovIST AustriaVerified email at ist.ac.at
- Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
- Marcin JurdziñskiUniversity of Warwick, Department of Computer ScienceVerified email at warwick.ac.uk
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Tal MalkinProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
- Yuval IshaiTechnionVerified email at cs.technion.ac.il
- Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityVerified email at labri.fr
Follow