Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rafael DowsleyMonash UniversityVerified email at monash.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Alexander RussellUniversity of ConnecticutVerified email at cse.uconn.edu
Anderson C. A. NascimentoAssociate Professor, University of Washington, TacomaVerified email at uw.edu
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Carsten BaumAssistant Professor, Aarhus UniversityVerified email at cs.au.dk
Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br
Ignacio CascudoAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Ryo NishimakiNTT CorporationVerified email at hco.ntt.co.jp
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Peter GažiIOG ResearchVerified email at iohk.io
Mario LarangeiraTokyo Institute of Technology/IOHKVerified email at c.titech.ac.jp
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Sabine OechsnerPostdoc, University of EdinburghVerified email at ed.ac.uk
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
João Paulo Javidi da CostaHamm-Lippstadt University of Applied SciencesVerified email at hshl.de
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Irene GiacomelliProtocol LabsVerified email at protocol.ai
James Hsin-yu ChiangPhD Candidate, Technical University of DenmarkVerified email at dtu.dk
Follow