Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Stefan KölblGoogleVerified email at mailbox.org
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Denis ButinTU Darmstadt, Inria, Dublin City UniversityVerified email at cdc.informatik.tu-darmstadt.de
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Oussama DanbaCryptography Engineer at PQShieldVerified email at danba.nl
zhenfei zhangEthereum FoundationVerified email at ethereum.org
Ko StoffelenRadboud UniversityVerified email at cs.ru.nl
Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Fang SongPortland State UniversityVerified email at pdx.edu
Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp