Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chen-Mou ChengBTQ AGVerified email at btq.li
Jintai DingTHUVerified email at uc.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Chia-Hsin ChenMITVerified email at csail.mit.edu
yeong-nan yehVerified email at math.sinica.edu.tw
Ming-Hsien TsaiNational Institute of Cyber SecurityVerified email at nics.nat.gov.tw
Vincent HwangMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Po-Chun KuoBTQVerified email at btq.li
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Tung ChouAcademia SinicaVerified email at crypto.tw
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Albrecht PetzoldtFAU Erlangen NurembergVerified email at cs.fau.de
Wen-Ding LiCornell UniversityVerified email at cornell.edu
Xiaomu SHIVerified email at szu.edu.cn
Jiaxiang LIUShenzhen UniversityVerified email at szu.edu.cn
Jonathan McCuneGoogle IncVerified email at google.com