Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mark SimkinCryptography ResearcherVerified email at univariate.org
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Johannes KruppCISPA, Saarland UniversityVerified email at cispa.saarland
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Kasper Green LarsenProfessor, Computer Science, Aarhus UniversityVerified email at cs.au.dk
Amir AzodiHasso Plattner InsituteVerified email at azodi.me
Vipul GoyalNTT ResearchVerified email at vipulgoyal.org
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Franziskus KieferCryspenVerified email at franziskuskiefer.de
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Dana Dachman-SoledAssociate Professor, Department of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
Chris BrzuskaAalto UniversityVerified email at aalto.fi
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Immanuel SchweizerElectronics Data Officer, Merck KGaAVerified email at merckgroup.com
Follow