Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cnAlexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECVerified email at fc.up.pt
Samuel JeroSystems Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
Matthew JagielskiAnthropicVerified email at anthropic.com
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.ukJooyoung LeeSchool of Computing, KAISTVerified email at kaist.ac.kr
David PointchevalChief Scientific Officer at CosmianVerified email at ens.fr
Pierre-Alain DupontPhD Student at ENSVerified email at ens.frMarc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
KaiShuo ChengGeorgia Institute of TechnologyVerified email at gatech.eduVukašin KaradžićPhD student, TU DarmstadtVerified email at tu-darmstadt.de