Get my own profile
Public access
View all47 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Bo-Yin YangAcademia SinicaVerified email at moscito.org
John M. SchanckMozilla FirefoxVerified email at mozilla.com
Tung ChouAcademia SinicaVerified email at crypto.tw
Christiane PetersGoogleVerified email at google.com
Matthias J. KannwischerQuantum-Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Michael HutterPQShield LtdVerified email at pqshield.com
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl