Get my own profile
Public access
View all30 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nicky MouhaResearcher, NISTVerified email at nist.gov
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Willi MeierFHNWVerified email at fhnw.ch
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
Jinguang HanSoutheast University, ChinaVerified email at seu.edu.cn
Kerem VarıcıPost Doc, UCL : Université catholique de LouvainVerified email at uclouvain.be
Chaoyun LiCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Atul LuykxGoogleVerified email at google.com
Luan Cardoso dos SantosDoctoral Sudent, University of LuxembourgVerified email at uni.lu
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Christof BeierleRuhr University BochumVerified email at rub.de
Léo PerrinInriaVerified email at inria.fr
Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Follow
Qingju Wang (王庆菊)
Postdoctoral Researcher, University of Luxembourg
Verified email at uni.lu - Homepage