Get my own profile
Public access
View all36 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter SchollAarhus UniversityVerified email at cs.au.dk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Delpech de Saint Guilhem, Cyprien3MI Labs, LeuvenVerified email at 3milabs.tech
Carsten BaumAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Dragos RotaruInversed TechVerified email at inversed.tech
Massimiliano SalaProfessor of Mathematics, University of TrentoVerified email at unitn.it
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Abdelrahaman AlyCryptography Research Centre, Technology Innovation Institute (TII)Verified email at tii.ae
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Eduardo Soria-VazquezTechnology Innovation InstituteVerified email at tii.ae
Titouan TanguyCryptography, ZamaVerified email at zama.ai
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Arpita PatraAssociate Professor, Dept. of Computer Science & Automation, Indian Institute of ScienceVerified email at iisc.ac.in
Ashish ChoudhuryIIIT BangaloreVerified email at iiitb.ac.in
Lawrence RoyPostdoc, Aarhus UniversityVerified email at cs.au.dk
Carmit HazayBar-Ilan University, IsraelVerified email at biu.ac.il
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk