Get my own profile
Public access
View all43 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Gregor SeilerIBM Research EuropeVerified email at posteo.netPeter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
John M. SchanckMozilla FirefoxVerified email at mozilla.com
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Gregory NevenChainlink LabsVerified email at smartcontract.com
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
Kathrin HövelmannsEindhoven University of TechnologyVerified email at hoevelmanns.net
Julian LossRuhr University BochumVerified email at rub.de
Tadayoshi KohnoProfessor and McDevitt Chair in Computer Science, Ethics, and Society at Georgetown UniversityVerified email at georgetown.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
Follow