Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel TschudiConcordiumVerified email at concordium.com
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Christian MattConcordiumVerified email at concordium.com
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaMax Planck Institute for Security and PrivacyVerified email at csp.mpg.de
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Aniket KatePurdue UniversityVerified email at purdue.edu
Adithya BhatPhD Student at Purdue UniversityVerified email at purdue.edu
Yiannis TselekounisCarnegie Mellon University, Department of Computer ScienceVerified email at cs.cmu.edu
Danilo FrancatiPostdoctoral researcher, Aarhus UniversityVerified email at cs.au.dk
Hugo KrawczykAlgorand FoundationVerified email at algorand.foundation