Get my own profile
Public access
View all29 articles
1 article
available
not available
Based on funding mandates
Co-authors
Peter SchollAarhus UniversityVerified email at cs.au.dk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Massimiliano SalaProfessor of Mathematics, University of TrentoVerified email at unitn.it
Delpech de Saint Guilhem, CyprienPost-Doctoral Research Assistant, imec-COSIC, KU LeuvenVerified email at kuleuven.be
Dragos RotaruCape PrivacyVerified email at capeprivacy.com
Eduardo Soria-VazquezTechnology Innovation InstituteVerified email at tii.ae
Martin R. AlbrechtRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Abdelrahaman AlyCryptography Research Centre, Technology Innovation Institute (TII)Verified email at tii.ae
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Carsten BaumAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
Titouan TanguyPhD Student, KU LeuvenVerified email at kuleuven.be
Arpita PatraAssociate Professor, Dept. of Computer Science & Automation, Indian Institute of ScienceVerified email at iisc.ac.in
Ashish ChoudhuryIIIT BangaloreVerified email at iiitb.ac.in
Carmit HazayBar-Ilan University, IsraelVerified email at biu.ac.il
Claudio OrlandiAssociate Professor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com
Joop van de PolUnaffiliatedVerified email at my.bristol.ac.uk