Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
John M. SchanckMozilla FirefoxVerified email at mozilla.com
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Stefan KölblGoogleVerified email at mailbox.org
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Denis ButinTU Darmstadt, Inria, Dublin City UniversityVerified email at cdc.informatik.tu-darmstadt.de
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Oussama DanbaCryptography Engineer at PQShieldVerified email at danba.nl
Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
zhenfei zhangEthereum FoundationVerified email at ethereum.org
Ko StoffelenRadboud UniversityVerified email at cs.ru.nl
Jeffrey E HoffsteinProfessor of Mathematics, Brown UniversityVerified email at math.brown.edu
Bas WesterbaanResearch Engineer, CloudflareVerified email at cloudflare.com