Get my own profile
Public access
View all55 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Benjamin DowlingKing's College LondonVerified email at kcl.ac.uk
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.comJoppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.comPeter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Jothi Rangasamy a.k.a Jothi Ramaling...National Institute of Technology Karnataka - NITKVerified email at nitk.edu.inValeria NikolaenkoResearch Partner, A16Z CryptoVerified email at cs.stanford.edu
Ilya MironovMetaVerified email at meta.comAnanth RaghunathanFacebook Inc.Verified email at cs.stanford.edu
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Jacqueline BrendelVerified email at jbrendel-info.de
Thom WiggersSenior Cryptography Researcher, PQShieldVerified email at thomwiggers.nl
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAEVerified email at eng.pdn.ac.lk