Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Quisquater Jean-JacquesUCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
Benoit LibertZamaVerified email at ens-lyon.fr
Valeria NikolaenkoPhD Student, Stanford UniversityVerified email at stanford.edu
Stratis IoannidisNortheastern UniversityVerified email at neu.edu
Moti YungPrincipal Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Nina TaftSenior Research Scientist, GoogleVerified email at google.com
Benoit Chevallier-MamesZamaVerified email at zama.ai
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Udi WeinsbergFacebookVerified email at fb.com
Michael TunstallCryptography ResearchVerified email at cryptography.com
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Thomas PetersResearch Associate (F.R.S.-FNRS), UCLouvain, BelgiumVerified email at uclouvain.be
Jan CamenischDFINITYVerified email at dfinity.org
Gregory NevenDFINITYVerified email at dfinity.org
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Atsuko MiyajiOsaka UniversityVerified email at jaist.ac.jp
Raveen GoundarVerified email at unsw.edu.au
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl