Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nicky MouhaResearcher, NISTVerified email at nist.gov
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
Willi MeierFHNWVerified email at fhnw.ch
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Chaoyun LiCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Kerem VarıcıMastercardVerified email at mastercard.com
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Luan Cardoso dos SantosDoctoral Sudent, University of LuxembourgVerified email at uni.lu
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Christof BeierleRuhr University BochumVerified email at rub.de
Léo PerrinInriaVerified email at inria.fr
Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Lorenzo GrassiPostDoc, Radboud University, Nijmegen (the Netherlands)Verified email at science.ru.nl
Kai Hu (胡凯)Nanyang Technological UniversityVerified email at ntu.edu.sg
Follow
Qingju Wang (王庆菊)
Postdoctoral Researcher, University of Luxembourg
Verified email at uni.lu - Homepage