Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel TschudiConcordiumVerified email at concordium.com
Christian MattPrimevVerified email at primev.xyz
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Adithya BhatStaff Research Scientist at Visa ResearchVerified email at visa.com
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk