Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
- Siyao GUONYU ShanghaiVerified email at nyu.edu
- Alon RosenBocconi UniversityVerified email at unibocconi.it
- Andrej BogdanovChinese University of Hong KongVerified email at cse.cuhk.edu.hk
- Silas RichelsonProfessor of Computer Science, UC RiversideVerified email at cs.ucr.edu
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
- Gaven WatsonMetaVerified email at meta.com
- Peter RindalVisa ReseachVerified email at visa.com
- Stefan DziembowskiUniversity of Warsaw and IDEAS NCBRVerified email at mimuw.edu.pl
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it