Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Damian VizárData Security Scientist, CSEM SwitzerlandVerified email at csem.ch
Srinivas VivekInternational Institute of Information Technology, BangaloreVerified email at iiitb.ac.in
Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenVerified email at esat.kuleuven.be
Dmitry KhovratovichEthereum FoundationVerified email at abdkconsulting.com
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Rishiraj BhattacharyyaUniversity of BirminghamVerified email at bham.ac.uk
Léo PerrinInriaVerified email at inria.fr
Sebastian RamacherScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Dragos RotaruInversed TechVerified email at inversed.tech
Gaëtan LeurentINRIAVerified email at inria.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Stefan KölblGoogleVerified email at mailbox.org