Crea il mio profilo
Accesso pubblico
Visualizza tutto45 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kenny PatersonProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Carlos CidSimula UiB and Okinawa Institute of Science and TechnologyEmail verificata su simula.no
- Ludovic PerretSorbonne University/LIP6Email verificata su lip6.fr
- Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsEmail verificata su cwi.nl
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Amit DeoZamaEmail verificata su zama.ai
- Fernando VirdiaUniversidade NOVA de Lisboa / NOVA LINCSEmail verificata su campus.fct.unl.pt
- Rachel PlayerRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Shi BaiFlorida Atlantic UniversityEmail verificata su fau.edu
- Emmanuela OrsiniBocconi UniversityEmail verificata su kuleuven.be
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyEmail verificata su alum.mit.edu
- Peter SchwabeMPI-SP and Radboud UniversityEmail verificata su mpi-sp.org
- Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Email verificata su ruhr-uni-bochum.de
- Tyge TiessenTechnical University of DenmarkEmail verificata su dtu.dk
- Alex DavidsonUniversidade NOVA de LisboaEmail verificata su fct.unl.pt
- Pooya FarshimIOG Research & Durham UniversityEmail verificata su durham.ac.uk
- Daniele MicciancioProfessor of Computer Science, University of California San DiegoEmail verificata su cs.ucsd.edu
- Arnab RoyUniversität InnsbruckEmail verificata su uibk.ac.at
- Sam ScottCornell TechEmail verificata su cornell.edu
- Lenka MarekováApplied Cryptography Group, ETH ZürichEmail verificata su inf.ethz.ch