Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Daniel MalinowskiUniversity of WarsawVerified email at crypto.edu.pl
Marcin AndrychowiczGoogle BrainVerified email at openai.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Łukasz MazurekPhD student, Institute of Informatics, University of WarsawVerified email at mimuw.edu.pl
Tomasz Kazanaasystent, Uniwersytet WarszawskiVerified email at crypto.edu.pl
Ivan DamgĺrdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Lisa EckeyVerified email at crisp-da.de
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Kristina HostákováETH ZürichVerified email at inf.ethz.ch
Tal RabinIBM ResearchVerified email at us.ibm.com
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Marcin JurdzińskiUniversity of Warwick, Department of Computer ScienceVerified email at warwick.ac.uk
Vladimir KolmogorovIST AustriaVerified email at ist.ac.at
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Tal MalkinProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityVerified email at labri.fr