Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chen-Mou ChengBTQ AGVerified email at btq.li
Jintai DingUniversity of CincinnatiVerified email at uc.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Chia-Hsin ChenMITVerified email at csail.mit.edu
yeong-nan yehVerified email at math.sinica.edu.tw
Po-Chun KuoBTQVerified email at btq.li
Vincent HwangNational Taiwan UniversityVerified email at ntu.edu.tw
Tung ChouAcademia SinicaVerified email at crypto.tw
Ming-Hsien TsaiNational Institute of Cyber SecurityVerified email at nics.nat.gov.tw
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Wen-Ding LiCornell UniversityVerified email at cornell.edu
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Albrecht PetzoldtFAU Erlangen NurembergVerified email at cs.fau.de
Jonathan McCuneGoogle IncVerified email at google.com
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Yueh-Hsun LinApple Inc.Verified email at andrew.cmu.edu