Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Daniel MalinowskiUniversity of WarsawVerified email at crypto.edu.pl
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Marcin AndrychowiczGoogle BrainVerified email at openai.com
Łukasz MazurekPhD student, Institute of Informatics, University of WarsawVerified email at mimuw.edu.pl
Tomasz Kazanaasystent, Uniwersytet WarszawskiVerified email at crypto.edu.pl
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Lisa EckeyVerified email at crisp-da.de
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Kristina HostákováETH ZürichVerified email at inf.ethz.ch
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Vladimir KolmogorovIST AustriaVerified email at ist.ac.at
Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Marcin JurdzińskiUniversity of Warwick, Department of Computer ScienceVerified email at warwick.ac.uk
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Tal MalkinProfessor of Computer Science, Columbia UniversityVerified email at columbia.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Igor WalukiewiczCNRS, LaBRI, Bordeaux UniversityVerified email at labri.fr
Follow![Stefan Dziembowski](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=VgiXQ2YAAAAJ&citpid=3)