Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Stefan KölblGoogleVerified email at mailbox.org
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Denis ButinTU Darmstadt, Inria, Dublin City UniversityVerified email at cdc.informatik.tu-darmstadt.de
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
zhenfei zhangEthereum FoundationVerified email at ethereum.org
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Oussama DanbaCryptography Engineer at PQShieldVerified email at danba.nl
Ko StoffelenRadboud UniversityVerified email at cs.ru.nl
Fang SongPortland State UniversityVerified email at pdx.edu
Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Bas WesterbaanResearch Engineer, CloudflareVerified email at cloudflare.com