Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Abraham WesterbaanFormer AARMS postdoctoral fellow, DalhousieVerified email at dal.ca
Kenta ChoNational Institute of InformaticsVerified email at nii.ac.jp
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
John van de WeteringPostdoc at Oxford University Quantum GroupVerified email at cs.ru.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Sander UijlenPhD student iCIS, NijmegenVerified email at cs.ru.nl
Aleks KissingerAssociate Professor, University of OxfordVerified email at cs.ox.ac.uk
Sean TullCambridge Quantum ComputingVerified email at cambridgequantum.com
Luke ValentaCloudflareVerified email at cloudflare.com
Thom WiggersRadboud University – Institute for Computing and Information Sciences – Digital SecurityVerified email at ru.nl
Christopher A. WoodRIT, UCI, Cloudflare, AppleVerified email at heapingbits.net
Alexandra SilvaCornell UniversityVerified email at cornell.edu
Jurriaan RotUniversity College London & Radboud UniversityVerified email at cs.ru.nl
Shuichi KatsumataNational Institute of Advanced Industrial Science and Technology (AIST), JapanVerified email at aist.go.jp
Keitaro HashimotoTokyo Institute of TechnologyVerified email at m.titech.ac.jp
Thomas PrestPQShieldVerified email at pqshield.com
Tobias FritzDepartment of Mathematics, University of InnsbruckVerified email at uibk.ac.at
Nicholas SullivanCloudflare Inc.Verified email at cloudflare.com
Sofía CeliBraveVerified email at riseup.net
Henk BarendregtRadboud UniversityVerified email at cs.ru.nl