Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Josep BalaschKU LeuvenVerified email at kuleuven.be
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Carmela TroncosoEPFLVerified email at epfl.ch
Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Peter Browne RønneResearcherVerified email at nbi.dk
Aditya DamodaranSnT, University of LuxembourgVerified email at uni.lu
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Gregory NevenChainlink LabsVerified email at smartcontract.com
Tiziano BianchiPolitecnico di TorinoVerified email at polito.it
Alessandro PivaDepartment of Information Engineering, University of FlorenceVerified email at unifi.it
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Ziya Alper GençResearch Associate, University of LuxembourgVerified email at uni.lu
Nikita BorisovProfessor of Electrical and Computer Engineering, University of Illinois at UrbanaVerified email at illinois.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk