Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Peter RindalVisa ReseachVerified email at visa.com
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jiaxin PanNTNU – Norwegian University of Science and TechnologyVerified email at ntnu.no
Siyao GUONYU ShanghaiVerified email at nyu.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hk
Silas RichelsonProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Stefan DziembowskiUniversity of WarsawVerified email at mimuw.edu.pl
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it
Gaven WatsonMetaVerified email at meta.com