Get my own profile
Public access
View all36 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Gregory NevenDFINITYVerified email at dfinity.org
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Damien StehléENS de LyonVerified email at ens-lyon.fr
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Jiaxin PanNTNU – Norwegian University of Science and TechnologyVerified email at ntnu.no
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Kathrin HövelmannsEindhoven University of TechnologyVerified email at hoevelmanns.net
Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
David GalindoChief Research Officer, Valory AGVerified email at valory.xyz
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Follow