Get my own profile
Public access
View all28 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.dekrzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Daniel MalinowskiUniversity of WarsawVerified email at crypto.edu.pl
Marcin AndrychowiczGoogle BrainVerified email at openai.com
Łukasz MazurekPhD student, Institute of Informatics, University of WarsawVerified email at mimuw.edu.pl
Tomasz Kazanaasystent, Uniwersytet WarszawskiVerified email at crypto.edu.pl
Lisa EckeyVerified email at crisp-da.deIvan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Kristina HostákováETH ZürichVerified email at inf.ethz.ch
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Vladimir KolmogorovIST AustriaVerified email at ist.ac.atMarcin JurdzińskiUniversity of Warwick, Department of Computer ScienceVerified email at warwick.ac.uk
Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Tal MalkinProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityVerified email at labri.fr
Follow