Get my own profile
Public access
View all53 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Thomas P. JakobsenPhD, Security Architect at BlockdaemonVerified email at blockdaemon.com
Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityVerified email at cs.au.dk
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Matthias FitziIOHKVerified email at iohk.io
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Jakob PagterSepior ApSVerified email at sepior.com
Martin GeislerUniversity of AarhusVerified email at geisler.net
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Roberto TrifilettiPhD Student, Aarhus UniversityVerified email at cs.au.dk
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Michael SchwartzbachProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Peter BogetoftProfessor, Copenhagen Business SchoolVerified email at cbs.dk
Kurt NielsenUniversity of CopenhagenVerified email at ifro.ku.dk
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Christian MattConcordiumVerified email at concordium.com
Follow
Jesper Buus Nielsen
Professor of Computer Science, Aarhus University
Verified email at cs.au.dk - Homepage