Get my own profile
Public access
View all28 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Alexander RussellUniversity of ConnecticutVerified email at cse.uconn.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Christian BadertscherIOG ResearchVerified email at iohk.io
Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Vassilis ZikasPurdue UniversityVerified email at cs.purdue.edu
Georg FuchsbauerTU WienVerified email at ist.ac.at
Sunoo ParkMITVerified email at csail.mit.edu
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Albert KwonMITVerified email at mit.edu
Aljosha JudmayerPhD Student at TU Wien, researcher at University of Vienna & SBA ResearchVerified email at 3-volution.net
Nicholas StifterSBA Research, University of ViennaVerified email at alumni.tuwien.ac.at
Itay TsabaryPhD Candidate, Technion, IsraelVerified email at campus.technion.ac.il
Alexei ZamyatinInterlay, Imperial College LondonVerified email at imperial.ac.uk
Matthias FitziIOHKVerified email at iohk.io
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Ittay EyalAssociate Professor, EE, TechnionVerified email at technion.ac.il
Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
Dionysis ZindrosStanfordVerified email at stanford.edu