Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Mahdi CheraghchiAssociate Professor of Computer Science and Engineering, University of Michigan, Ann ArborEmail verificata su umich.edu
Maciej ObremskiNational University of SingaporeEmail verificata su nus.edu.sg
Divesh AggarwalNUSEmail verificata su nus.edu.sg
Mark SimkinCryptography ResearcherEmail verificata su univariate.org
Olgica MilenkovicUniversity of IllinoisEmail verificata su illinois.edu
Ryan GabrysResearcher at Naval Information Warfare Center and UCSDEmail verificata su spawar.navy.mil
Venkatesan GuruswamiUniversity of California, BerkeleyEmail verificata su berkeley.edu
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
Luisa SiniscalchiTechnical University of DenmarkEmail verificata su dtu.dk
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
Chen-Da Liu-ZhangLucerne University of Applied Sciences and Arts & Web3 FoundationEmail verificata su hslu.ch
Vipul GoyalNTT ResearchEmail verificata su vipulgoyal.org
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
Srilakshmi PattabiramanLead Research Scientist, Analog Devices Inc.Email verificata su analog.com
Antonio FaonioEURECOMEmail verificata su eurecom.fr
Gianluca BrianETH ZürichEmail verificata su inf.ethz.ch
Vishal RanaUniversity of Illinois, Urbana-ChampaignEmail verificata su illinois.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
Ke WuCMUEmail verificata su andrew.cmu.edu
Maciej SkórskiUniversity of WarsawEmail verificata su mimuw.edu.pl
Segui
João Ribeiro
Instituto de Telecomunicações and Instituto Superior Técnico, Universidade de Lisboa
Email verificata su tecnico.ulisboa.pt - Home page