Get my own profile
Public access
View all52 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Benjamin DowlingKing's College LondonVerified email at kcl.ac.uk
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Jothi Rangasamy a.k.a Jothi Ramaling...National Institute of Technology Karnataka - NITKVerified email at nitk.edu.in
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Valeria NikolaenkoResearch Partner, A16Z CryptoVerified email at cs.stanford.edu
Ilya MironovMetaVerified email at meta.com
Ananth RaghunathanFacebook Inc.Verified email at cs.stanford.edu
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Juan GonzalezTeron LabsVerified email at teronlabs.com
Jacqueline BrendelVerified email at jbrendel-info.de