Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Atul LuykxGoogleVerified email at google.com
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Damian VizárData Security Scientist, CSEM SwitzerlandVerified email at csem.ch
- Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
- Amit Singh BhatiPhD researcher at COSIC, KU LeuvenVerified email at esat.kuleuven.be
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
- John KelseyNISTVerified email at nist.gov
- Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenVerified email at esat.kuleuven.be
- NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
- Jonathan HochWeizmann Institute of ScienceVerified email at necam.com
- Thomas ShrimptonProfessor of Computer Science, University of FloridaVerified email at ufl.edu