Get my own profile
Public access
View all33 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jan CamenischDFINITYVerified email at dfinity.org
Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Gregory NevenDFINITYVerified email at dfinity.org
Kai SamelinDZ HypVerified email at dzhyp.de
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Thomas SchneiderTechnical University of DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
David DerlerDFINITYVerified email at dfinity.org
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Robert R. EnderleinGoogleVerified email at e7n.ch
Henrich C. PöhlsUniversity of PassauVerified email at uni-passau.de
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECVerified email at fc.up.pt