Get my own profile
Public access
View all32 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
- Nicky MouhaResearcher, NISTVerified email at nist.gov
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Willi MeierFHNWVerified email at fhnw.ch
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
- Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
- Christof BeierleRuhr University BochumVerified email at rub.de
- Léo PerrinInriaVerified email at inria.fr
- Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
- Kerem VarıcıMastercardVerified email at mastercard.com
- Chaoyun LiCOSIC, KU LeuvenVerified email at esat.kuleuven.be
- Meiqin WangProfessor of Mathematics, Shandong UniversityVerified email at sdu.edu.cn
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Kai HuShandong UniversityVerified email at sdu.edu.cn
- Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at