Get my own profile
Public access
View all46 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Sihang PuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Lucjan HanzlikCISPA, Saarland University, Saarland Informatics CampusVerified email at cispa.saarland
Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
Daniel MasnyMetaVerified email at fb.com
Peihan MiaoBrown UniversityVerified email at brown.edu
Divya GuptaPrincipal Researcher, Microsoft Research IndiaVerified email at microsoft.com
Tamer MourPhD Student, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Rafael DowsleyMonash UniversityVerified email at monash.edu
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk