Get my own profile
Public access
View all45 articles
1 article
available
not available
Based on funding mandates
Co-authors
Emmanuela OrsiniBocconi UniversityVerified email at kuleuven.be
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Nigel SmartKU LeuvenVerified email at kuleuven.be
Elette BoyleVerified email at mit.edu
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Niv GilboaComputer Science, Ben-Gurion UniversityVerified email at bgu.ac.il
Geoffroy CouteauCNRS Researcher in Theoretical Computer Science, IRIF, Université de ParisVerified email at irif.fr
Carsten BaumAssistant Professor, Technical University of DenmarkVerified email at dtu.dk
Daniel EscuderoJP Morgan AI ResearchVerified email at jpmorgan.com
Eduardo Soria-VazquezTechnology Innovation InstituteVerified email at tii.ae
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Dragos RotaruZamaVerified email at zama.ai
Carmit HazayBar-Ilan University, IsraelVerified email at biu.ac.il
Tore Kasper FrederiksenSenior Cryptography Engineer, Alexandra InstituteVerified email at alexandra.dk
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Chaoping XINGShanghai Jiaotong UniversityVerified email at sjtu.edu.cn
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at