Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Vincent HwangMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Ko StoffelenRadboud UniversityVerified email at cs.ru.nl
Amber SprenkelsRadboud UniversityVerified email at electricdusk.com
Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
Cheng-Jhih ShihNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Amin AbdulrahmanPhD Student, Max Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Fabio CamposPostdoc at University of Applied Sciences WiesbadenVerified email at sopmac.de
Thom WiggersSenior Cryptography Researcher, PQShieldVerified email at thomwiggers.nl
Ward BeullensResearcher at IBM Research ZurichVerified email at zurich.ibm.com
Juliane KrämerProfessor, University of RegensburgVerified email at ur.de
Daniel HeinzInfineon Technologies AGVerified email at infineon.com
Georg LandRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
Sofía CeliResearcher at BraveVerified email at riseup.net
Chi-Ming ChungNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Gregor SeilerIBM Research EuropeVerified email at posteo.net
Marc StöttingerRheinMain University of Applied SciencesVerified email at hs-rm.de
Basil HessIBM ResearchVerified email at zurich.ibm.com