Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Daniel MalinowskiUniversity of WarsawVerified email at crypto.edu.pl
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Marcin AndrychowiczGoogle BrainVerified email at openai.com
Łukasz MazurekPhD student, Institute of Informatics, University of WarsawVerified email at mimuw.edu.pl
Tomasz Kazanaasystent, Uniwersytet WarszawskiVerified email at crypto.edu.pl
Lisa EckeyVerified email at crisp-da.de
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Kristina HostákováETH ZürichVerified email at inf.ethz.ch
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Vladimir KolmogorovIST AustriaVerified email at ist.ac.at
Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Marcin JurdzińskiUniversity of Warwick, Department of Computer ScienceVerified email at warwick.ac.uk
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Tal MalkinProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityVerified email at labri.fr
Follow