Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Roger WattenhoferETH ZurichVerified email at ethz.ch
- Yuyi WangETH ZurichVerified email at ethz.ch
- Lefteris Kokoris KogiasMystenLabsVerified email at mystenlabs.com
- Dionysis ZindrosCommon PrefixVerified email at stanford.edu
- Lioba HeimbachETH ZürichVerified email at ethz.ch
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
- Michelle X. YeoIST AustriaVerified email at uchicago.edu
- Samarth TiwariPhD student at Centrum Wiskunde & Informatica, Amsterdam, The NetherlandsVerified email at cwi.nl
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Stefan SchmidProfessor, Computer Science, TU Berlin & Weizenbaum Institute & Fraunhofer SITVerified email at tu-berlin.de
- Laurent VanbeverAssociate Professor, ETH ZürichVerified email at ethz.ch
- Patrick WintermeyerETH ZürichVerified email at alumni.ethz.ch
- Iosif SalemResearcher Engineer, ZeroPoint Technologies ABVerified email at zptcorp.com
- Ioannis PsarrosPostdoctoral Researcher, Athena Research CenterVerified email at athenarc.gr
- Ioannis EmirisAthena Research Center; and National & Kapodistrian University of AthensVerified email at di.uoa.gr
- Alexei ZamyatinDistributed Crafts, Imperial College LondonVerified email at imperial.ac.uk
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk