Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
Nicky MouhaResearcher, NISTVerified email at nist.gov
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Willi MeierFHNWVerified email at fhnw.ch
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Chaoyun LiUniversity of Surrey, UK, and COSIC, KU LeuvenVerified email at esat.kuleuven.be
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Christof BeierleRuhr University BochumVerified email at rub.de
Léo PerrinInriaVerified email at inria.fr
Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
Kerem VarıcıMastercardVerified email at mastercard.com
Meiqin WangProfessor of Mathematics, Shandong UniversityVerified email at sdu.edu.cn
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Kai HuShandong UniversityVerified email at sdu.edu.cn