Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Rosario GennaroProfessor of Computer Science, City College of New YorkVerified email at cs.ccny.cuny.edu
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Mehmet Sabir KirazSenior Lecturer and Programme Lead of Cyber Security, De Montfort University, UKVerified email at dmu.ac.uk
Meilof VeeningenPostdoctoral researcher, Eindhoven University of TechnologyVerified email at tue.nl
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Matt FranklinProfessor of Computer Science, U. C. DavisVerified email at cs.ucdavis.edu
Evgeny VerbitskiyLeiden University/ Groningen UniversityVerified email at math.leidenuniv.nl
Antoon BosselaersKU LeuvenVerified email at esat.kuleuven.be
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Jacques TraoreOrange LabsVerified email at orange.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Pascal PaillierCryptoExpertsVerified email at cryptoexperts.com
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
B SkoricTU EindhovenVerified email at tue.nl
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Helger LipmaaSimula UiBVerified email at ut.ee
Marc JoyeZamaVerified email at zama.ai
Antonio ZilliUniversitā del SalentoVerified email at dtascarl.it
Cimato StelvioAssociate Professor, Universitā degli Studi di MilanoVerified email at unimi.it