Get my own profile
Public access
View all35 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Ilia IliashenkoCiphermode LabsVerified email at ciphermode.tech
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel AugotINRIA et LIXVerified email at inria.fr
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Andrew V. SutherlandPrincipal Research Scientist, Massachusetts Institute of TechnologyVerified email at math.mit.edu
Terence TaoProfessor of Mathematics, UCLAVerified email at math.ucla.edu
Philippe MICHELProfessor of MathematicsVerified email at epfl.ch
John VoightDartmouth CollegeVerified email at dartmouth.edu
Gergely HarcosAlfréd Rényi Institute of Mathematics, Budapest, HungaryVerified email at renyi.hu
Xiao-Feng XieWIOMAXVerified email at wiomax.com
Charlotte BonteKU LeuvenVerified email at esat.kuleuven.be
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Reza Rezaeian FarashahiAssistant Professor, Dept. of Mathematical Sciences, Isfahan University of TechnologyVerified email at cc.iut.ac.ir
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz
Jan TuitmanKU LeuvenVerified email at kuleuven.be
Mohamed Saied MohamedInformation Technology Security Specialist at Deutsche TelekomVerified email at t-systems.com
Sudhir GhorpadeProfessor of Mathematics, IIT BombayVerified email at math.iitb.ac.in
Samrith RamAssociate Professor, IIIT DelhiVerified email at iiitd.ac.in
Alexis De VosUniversiteit GentVerified email at elis.UGent.be