Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Alexander RussellUniversity of ConnecticutVerified email at cse.uconn.edu
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Christian BadertscherIOG ResearchVerified email at iohk.io
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Vassilis ZikasPurdue UniversityVerified email at cs.purdue.edu
Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
Georg FuchsbauerTU WienVerified email at ist.ac.at
Sunoo ParkMITVerified email at csail.mit.edu
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Matthias FitziIOHKVerified email at iohk.io
Aljosha JudmayerPhD Student at TU Wien, researcher at University of Vienna & SBA ResearchVerified email at 3-volution.net
Nicholas StifterSBA Research, University of ViennaVerified email at alumni.tuwien.ac.at
Itay TsabaryPhD Candidate, Technion, IsraelVerified email at campus.technion.ac.il
Alexei ZamyatinInterlay, Imperial College LondonVerified email at imperial.ac.uk
Albert KwonMITVerified email at mit.edu
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Sarah MeiklejohnProfessor at University College LondonVerified email at ucl.ac.uk
Ittay EyalAssociate Professor, ECE, TechnionVerified email at technion.ac.il
Dionysis ZindrosStanford UniversityVerified email at stanford.edu