Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Péter BurcsiEötvös Loránd UniversityVerified email at inf.elte.hu
Ferenc BéresInstitute for Computer Science and Control (SZTAKI)Verified email at sztaki.hu
András BenczúrInstitute for Computer Science and ControlVerified email at sztaki.hu
Laszlo GulyasEIT Digital, Lorand Eotvos UniversityVerified email at inf.elte.hu
Omer ShlomovitsingonyamaVerified email at ingonyama.com
Mikerah Quintyne-CollinsHashCloak IncVerified email at hashcloak.com
Máté HorváthPostdoc, University of WuppertalVerified email at crysys.hu
Mike WuStanford UniversityVerified email at cs.stanford.edu
Varun MadathilGraduate Research Assistant, North Carolina State UniversityVerified email at ncsu.edu
Alessandra ScafuroNorth Carolina State UniversityVerified email at ncsu.edu
Domokos Miklós KelenEötvös Loránd UniversityVerified email at sztaki.mta.hu
Balázs PejóCrySyS LabVerified email at crysys.hu
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Yuval KogmanunaffiliatedVerified email at woobling.org
Noemi GlaeserPhD student, University of Maryland & Max Planck Institute for Security and Privacy (MPI-SP)Verified email at umd.edu
Pratyush Ranjan TiwariJohns Hopkins UniversityVerified email at jhu.edu
Péter KutasEötvös Loránd University and University of BirminghamVerified email at bham.ac.uk
Valeria NikolaenkoResearch Partner, A16Z CryptoVerified email at cs.stanford.edu
YINUO ZHANGUC BerkeleyVerified email at berkeley.edu