Get my own profile
Public access
View all46 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Benjamin DowlingETH ZürichVerified email at inf.ethz.ch
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Jothi Rangasamy a.k.a Jothi Ramaling...National Institute of Technology Karnataka - NITKVerified email at nitk.edu.in
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Juan GonzalezTeron LabsVerified email at teronlabs.com
Janaka AlawatugodaDepartment of Computer Engineering, University of PeradeniyaVerified email at eng.pdn.ac.lk
Hans EberleNVIDIAVerified email at computer.org
Valeria NikolaenkoPhD Student, Stanford UniversityVerified email at stanford.edu
Ilya MironovMeta AIVerified email at fb.com
Ananth RaghunathanFacebook Inc.Verified email at cs.stanford.edu
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de