Get my own profile
Public access
View all26 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rafael DowsleyMonash UniversityVerified email at monash.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Alexander RussellUniversity of ConnecticutVerified email at cse.uconn.edu
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Anderson C. A. NascimentoAssociate Professor, University of Washington, TacomaVerified email at uw.edu
Carsten BaumAssistant Professor, Technical University of DenmarkVerified email at dtu.dk
Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br
Ignacio CascudoAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Ryo NishimakiNTT CorporationVerified email at hco.ntt.co.jp
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Peter GažiIOG ResearchVerified email at iohk.io
Mario LarangeiraTokyo Institute of Technology/IOHKVerified email at c.titech.ac.jp
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Sabine OechsnerPostdoc, University of EdinburghVerified email at ed.ac.uk
João Paulo Javidi da CostaHamm-Lippstadt University of Applied SciencesVerified email at hshl.de
James Hsin-yu ChiangPhD Candidate, Technical University of DenmarkVerified email at ucla.edu
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Irene GiacomelliProtocol LabsVerified email at protocol.ai
Follow