Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Sabine OechsnerPostdoc, University of EdinburghVerified email at ed.ac.uk
Peter SchollAarhus UniversityVerified email at cs.au.dk
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Rafael DowsleyMonash UniversityVerified email at monash.edu
Joseph (Yossi) KeshetProfessor, Faculty of Electrical & Computer Engineering, TechnionVerified email at technion.ac.il
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Yossi AdiThe Hebrew UniversityVerified email at mail.huji.ac.il
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Emmanuela OrsiniBocconi UniversityVerified email at kuleuven.be
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Andrea CerulliDFINITYVerified email at dfinity.org
Jens GrothPrincipal Researcher, DFINITYVerified email at ucl.ac.uk
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
James Hsin-yu ChiangPhD Candidate, Technical University of DenmarkVerified email at ucla.edu
Alexander Munch-HansenAarhus UniversityVerified email at cs.au.dk
Follow