Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Damien StehléENS de LyonVerified email at ens-lyon.fr
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Daniele MicciancioProfessor of computer science, UCSDVerified email at eng.ucsd.edu
Oded RegevProfessor of Computer ScienceVerified email at cims.nyu.edu
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Thomas PrestPQShieldVerified email at pqshield.com
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Gregory NevenDFINITYVerified email at dfinity.org
Ngoc Khanh NguyenIBM Research Zurich and ETH ZurichVerified email at zurich.ibm.com
Alon RosenBocconi UniversityVerified email at unibocconi.it
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Alain DurmusENS Paris-SaclayVerified email at ens-paris-saclay.fr
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Carsten BaumAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
zhenfei zhangEthereum FoundationVerified email at ethereum.org