Get my own profile
Public access
View all15 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Nuttapong AttrapadungAIST, JapanVerified email at aist.go.jp
Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jpShweta AgrawalIndian Institute of Technology MadrasVerified email at iitm.ac.in
Shuichi KatsumataPQShield Ltd.Verified email at pqshield.com
Noboru KunihiroUniversity of TsukubaVerified email at cs.tsukuba.ac.jpRyo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com
Anshu YadavIST AustriaVerified email at ist.ac.atMonosij MaitraIIT KharagpurVerified email at cse.iitkgp.ac.in
Koji NuidaKyushu UniversityVerified email at imi.kyushu-u.ac.jpAlex DavidsonFaculdade de Ciências, Universidade de Lisboa, LASIGEVerified email at fc.ul.pt
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
TAPAS PALCo-Leader of KASTEL-C&C (KIT)Verified email at kit.edu
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Sanjay BhattacherjeeUniversity of KentVerified email at kent.ac.uk
Keita EmuraKanazawa UniversityVerified email at se.kanazawa-u.ac.jp
Kazuto OgawaVerified email at nhk.or.jpDaniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Bagus SantosoUniversity of Electro-CommunicationsVerified email at uec.ac.jpHiraku MoritaUniversity of Southern DenmarkVerified email at mmmi.sdu.dk
Satsuya OhataByerlis Inc.Verified email at byerlis.jp