Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Martijn StamSenior Researcher at Simula UiB, NorwayVerified email at simula.no
Luke MatherResearcher in Applied Cryptography, University of BristolVerified email at bristol.ac.uk
Jonathan O'ConnellResearch Assistant in Cryptography, University of BristolVerified email at bris.ac.uk
Jake LongoUniversity of BristolVerified email at bristol.ac.uk
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
Michael TunstallCryptography ResearchVerified email at cryptography.com
Marcin WójcikVerified email at cam.ac.uk
Ashley MontanaroUniversity of BristolVerified email at bristol.ac.uk
Tomasz KociumakaMax Planck Institute for Informatics, Saarland Informatics CampusVerified email at mpi-inf.mpg.de
Paweł GawrychowskiUniversity of WrocławVerified email at cs.uni.wroc.pl
Przemysław UznańskiPathwayVerified email at pathway.com
Raphael CliffordUniversity of BristolVerified email at cs.bris.ac.uk
Gareth T. DaviesNXP SemiconductorsVerified email at nxp.com
Christian JansonResearch Group Leader, Technische Universität Darmstadt (TU Darmstadt), GermanyVerified email at tu-darmstadt.de