Get my own profile
Public access
View all32 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jan CamenischDFINITYVerified email at dfinity.org
Thomas LoruenserScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Gregory NevenDFINITYVerified email at dfinity.org
Kai SamelinDräxlmaier GroupVerified email at draexlmaier.com
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Thomas SchneiderTechnical University of DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Robert R. EnderleinGoogleVerified email at e7n.ch
David DerlerDFINITYVerified email at dfinity.org
Henrich C. PöhlsUniversity of PassauVerified email at uni-passau.de
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECVerified email at fc.up.pt