Get my own profile
Public access
View all59 articles
1 article
available
not available
Based on funding mandates
Co-authors
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.toTanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.orgEike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Gregor SeilerIBM Research EuropeVerified email at posteo.netJoost RijneveldRadboud UniversityVerified email at cs.ru.nl
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
John M. SchanckMozilla FirefoxVerified email at mozilla.com
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Christiane PetersGoogleVerified email at google.com
Tung ChouAcademia SinicaVerified email at crypto.tw
Stefan KölblGoogleVerified email at mailbox.org