Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Thomas CreutzigProfessor of Mathematics at the University of AlbertaVerified email at ualberta.ca
Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityVerified email at yukawa.kyoto-u.ac.jp
Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
Marie-Laure ZollingerUniversity of LuxembourgVerified email at uni.lu
Thomas HainesAustralian National UniversityVerified email at anu.edu.au
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Hao ChengUniversity of LuxembourgVerified email at uni.lu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Jan LagerwallUniversity of LuxembourgVerified email at lcsoftmatter.com
Yong Genguniversity of luxembourgVerified email at uni.lu
Alfredo RialUniversity of LuxembourgVerified email at uni.lu
Carine LallemandEindhoven University of Technology & University of LuxembourgVerified email at tue.nl
Verena DistlerBundeswehr University MunichVerified email at unibw.de
Vincent KoenigUniversity of LuxembourgVerified email at uni.lu
Kristian GjøsteenNTNUVerified email at ntnu.no
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
Niels ObersNiels Bohr Institute & NorditaVerified email at nbi.dk
David Duenas-CidH2020 MSCA Widening Fellow - Gdansk University of TechnologyVerified email at pg.edu.pl