Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nicky MouhaResearcher, NISTVerified email at nist.gov
Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Willi MeierFHNWVerified email at fhnw.ch
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Chaoyun LiCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Kerem VarıcıMastercardVerified email at mastercard.com
Luan Cardoso dos SantosDoctoral Sudent, University of LuxembourgVerified email at uni.lu
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Christof BeierleRuhr University BochumVerified email at rub.de
Léo PerrinInriaVerified email at inria.fr
Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Kai Hu (胡凯)Nanyang Technological UniversityVerified email at ntu.edu.sg