Get my own profile
Public access
View all38 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Emmanuela OrsiniKU LeuvenVerified email at kuleuven.be
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Nigel SmartKU LeuvenVerified email at kuleuven.be
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Elette BoyleVerified email at mit.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Niv GilboaComputer Science, Ben-Gurion UniversityVerified email at bgu.ac.il
Geoffroy CouteauCNRS Researcher in Theoretical Computer Science, IRIF, Université de ParisVerified email at irif.fr
Daniel E. EscuderoJP Morgan AI ResearchVerified email at jpmorgan.com
Carsten BaumAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
Eduardo Soria-VazquezTechnology Innovation InstituteVerified email at tii.ae
Dragos RotaruCape PrivacyVerified email at capeprivacy.com
Carmit HazayBar-Ilan University, IsraelVerified email at biu.ac.il
Claudio OrlandiAssociate Professor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Chaoping XINGShanghai Jiaotong UniversityVerified email at sjtu.edu.cn
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at