Get my own profile
Public access
View all29 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Vassilis ZikasPurdue UniversityVerified email at cs.purdue.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Sandro CorettiIOHKVerified email at iohk.io
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Christian MattConcordiumVerified email at concordium.com
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Christian BadertscherIOG ResearchVerified email at iohk.io
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Cristina OneteXLIM/CNRS 7252/Université de LimogesVerified email at unilim.fr
Angelo De CaroÉcole Normale Supérieure, ParisVerified email at ens.fr
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Renato RennerProfessor for Theoretical Physics, ETH ZurichVerified email at ethz.ch
Christopher PortmannConcordium AGVerified email at concordium.com
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Jan CamenischDFINITYVerified email at dfinity.org
Peter GažiIOHK ResearchVerified email at iohk.io
Kaoutar ElkhiyaouiIBM ResearchVerified email at zurich.ibm.com