Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Péter BurcsiEötvös Loránd UniversityVerified email at inf.elte.hu
- Ferenc BéresInstitute for Computer Science and Control (SZTAKI)Verified email at sztaki.hu
- András BenczúrInstitute for Computer Science and ControlVerified email at sztaki.hu
- Laszlo GulyasEIT Digital, Lorand Eotvos UniversityVerified email at inf.elte.hu
- Omer ShlomovitsingonyamaVerified email at ingonyama.com
- Mikerah Quintyne-CollinsHashCloak IncVerified email at hashcloak.com
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
- Máté HorváthPostdoc, University of WuppertalVerified email at crysys.hu
- Mike WuStanford UniversityVerified email at cs.stanford.edu
- Domokos Miklós KelenEötvös Loránd UniversityVerified email at sztaki.mta.hu
- Noemi GlaeserPhD student, University of Maryland & Max Planck Institute for Security and Privacy (MPI-SP)Verified email at umd.edu
- Varun MadathilPostdoctoral Associate, Yale UniversityVerified email at ncsu.edu
- Alessandra ScafuroNorth Carolina State UniversityVerified email at ncsu.edu
- Balázs PejóCrySyS LabVerified email at crysys.hu
- Yuval KogmanunaffiliatedVerified email at woobling.org
- Valeria NikolaenkoResearch Partner, A16Z CryptoVerified email at cs.stanford.edu
- Ertem Nusret TasPhD Student, Stanford UniversityVerified email at stanford.edu
- Pratyush Ranjan TiwariJohns Hopkins UniversityVerified email at jhu.edu
- Péter KutasEötvös Loránd University and University of BirminghamVerified email at bham.ac.uk