Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Peter RindalVisa ReseachVerified email at visa.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
Siyao GUONYU ShanghaiVerified email at nyu.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hk
Silas RichelsonProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Gaven WatsonMetaVerified email at meta.com
Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it