Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com
Alessandro PivaDepartment of Information Engineering, University of FlorenceVerified email at unifi.it
Mauro BarniProfessor, University of SienaVerified email at dii.unisi.it
Rikke BendlinAarhus UniversityVerified email at cs.au.dk
David DerlerDFINITYVerified email at dfinity.org
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Thomas P. JakobsenPhD, SepiorVerified email at sepior.com
Kobbi NissimDept. of Computer Science (Georgetown) & Center for Research on Computation and Society (Harvard)Verified email at georgetown.edu
Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
Chaya GaneshIndian Institute of ScienceVerified email at iisc.ac.in
Mark SimkinPostdoc at Aarhus UniversityVerified email at cs.au.dk
Yuval IshaiVerified email at cs.technion.ac.il
Anders DalskovPartisiaVerified email at fastmail.com
Haya ShulmanFraunhofer Institute for Secure Information TechnologyVerified email at sit.fraunhofer.de
Claudio Orlandi
Associate Professor, Department of Computer Science, Aarhus University, Denmark
Verified email at cs.au.dk - Homepage