Get my own profile
Public access
View all45 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Tancrède LepointResearch Scientist, GoogleVerified email at google.com
Damien StehléENS de LyonVerified email at ens-lyon.fr
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Tung ChouAcademia SinicaVerified email at crypto.tw
Christiane PetersGoogleVerified email at google.com
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Michael HutterCryptography Research Inc, RambusVerified email at cryptography.com
Michael NaehrigPrincipal Researcher, Microsoft Research, USAVerified email at cryptojedi.org
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk