Get my own profile
Public access
View all40 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Atul LuykxGoogleVerified email at google.com
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Damian VizárData Security Scientist, CSEM SwitzerlandVerified email at csem.ch
Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
Amit Singh BhatiPhD researcher at COSIC, KU LeuvenVerified email at esat.kuleuven.be
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
John KelseyNISTVerified email at nist.gov
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenVerified email at esat.kuleuven.be
Gregory NevenChainlink LabsVerified email at smartcontract.com
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Jonathan HochWeizmann Institute of ScienceVerified email at necam.com
Thomas ShrimptonProfessor of Computer Science, University of FloridaVerified email at ufl.edu