Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Cédric FournetMicrosoft ResearchVerified email at microsoft.com
- Karthikeyan BhargavanINRIAVerified email at inria.fr
- Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
- Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
- Cătălin HrițcuTenured Faculty at MPI-SPVerified email at mpi-sp.org
- Jonathan ProtzenkoMicrosoft ResearchVerified email at ens-lyon.org
- Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
- Pierre-Yves StrubResearch Scientist, PQShieldVerified email at strub.nu
- Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
- Georges GonthierPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com
- Gavin BiermanOracleVerified email at oracle.com
- Avik ChaudhuriSoftware Engineer, MetaVerified email at meta.com
- Danel AhmanInstitute of Computer Science, University of TartuVerified email at ut.ee
- Bryan ParnoCarnegie Mellon UniversityVerified email at cmu.edu
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
- Samin IshtiaqRiverlaneVerified email at riverlane.com
- Ashay RaneGraduate Research Assistant, The University of Texas at AustinVerified email at utexas.edu
- Piotr MardzielindependentVerified email at cmu.edu
- Gordon PlotkinLaboratory for Foundations of Computer Science, School of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
- Rob JohnsonVMware ResearchVerified email at vmware.com