Get my own profile
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Benjamin DowlingETH ZürichVerified email at inf.ethz.ch
Juan Manuel Gonzalez NietoQueensland University of TechnologyVerified email at qut.edu.au
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Jothi Rangasamy a.k.a Jothi Ramaling...National Institute of Technology Karnataka - NITKVerified email at nitk.edu.in
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Michael NaehrigResearcher, Microsoft Research, USAVerified email at cryptojedi.org
Janaka AlawatugodaDepartment of Computer Engineering, University of PeradeniyaVerified email at acm.org
Hans EberleNVIDIAVerified email at computer.org
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Mark ManulisHead of Department of Computer Science, Associate Professor (Reader), University of SurreyVerified email at surrey.ac.uk
Katriel Cohn-GordonIndependent ScholarVerified email at katriel.co.uk
Gus GutoskiPerimeter Institute for Theoretical PhysicsVerified email at perimeterinstitute.ca
Valeria NikolaenkoPhD Student, Stanford UniversityVerified email at stanford.edu