Get my own profile
Public access
View all37 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Peter SchollAarhus UniversityVerified email at cs.au.dk
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
- Delpech de Saint Guilhem, Cyprien3MI Labs, LeuvenVerified email at 3milabs.tech
- Carsten BaumAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
- Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Dragos RotaruInversed TechVerified email at inversed.tech
- Massimiliano SalaProfessor of Mathematics, University of TrentoVerified email at unitn.it
- Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
- Eduardo Soria-VazquezTechnology Innovation InstituteVerified email at tii.ae
- Abdelrahaman AlyCryptography Research Centre, Technology Innovation Institute (TII)Verified email at tii.ae
- Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
- Titouan TanguyCryptography, ZamaVerified email at zama.ai
- Lawrence RoyPostdoc, Aarhus UniversityVerified email at cs.au.dk
- Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
- Arpita PatraAssociate Professor, Dept. of Computer Science & Automation, Indian Institute of ScienceVerified email at iisc.ac.in
- Ashish ChoudhuryIIIT BangaloreVerified email at iiitb.ac.in
- Carmit HazayBar-Ilan University, IsraelVerified email at biu.ac.il
- Lennart BraunAarhus UniversityVerified email at cs.au.dk
- Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk