Get my own profile
Public access
View all48 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Benjamin DowlingUniversity of SheffieldVerified email at sheffield.ac.uk
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Jothi Rangasamy a.k.a Jothi Ramaling...National Institute of Technology Karnataka - NITKVerified email at nitk.edu.in
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Valeria NikolaenkoPhD Student, Stanford UniversityVerified email at stanford.edu
Ilya MironovMetaVerified email at meta.com
Ananth RaghunathanFacebook Inc.Verified email at cs.stanford.edu
Janaka AlawatugodaResearch and Innovation Centers Division, Faculty of Resilience, Rabdan Academy, Abu Dhabi, UAEVerified email at ra.ac.ae
Hans EberleNVIDIAVerified email at computer.org
Juan GonzalezTeron LabsVerified email at teronlabs.com
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de