Get my own profile
Public access
View all79 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Sujoy Sinha RoyAssociate Professor, TU GrazVerified email at tugraz.at
Nigel SmartZamaVerified email at zama.ai
Wouter CastryckKU LeuvenVerified email at esat.kuleuven.beJan-Pieter D'AnversResearcher, KU LeuvenVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Angshuman KarmakarAssistant Professor, Department of Computer Science and Engineering, IIT KanpurVerified email at cse.iitk.ac.in
Ilia IliashenkoInversed TechVerified email at inversed.tech
Daniel PageSchool of Computer Science, University of BristolVerified email at cs.bris.ac.uk
Jens HermansCOSIC, KU LeuvenVerified email at esat.kuleuven.beOscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Ward BeullensResearcher at IBM Research ZurichVerified email at zurich.ibm.comEleftheria MakriAssistant Professor at LIACS, Leiden University, The Netherlands; Free Researcher KU Leuven, BelgiumVerified email at liacs.leidenuniv.nl
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nzNele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Charlotte BonteKU LeuvenVerified email at esat.kuleuven.beDonglong ChenAssociate Professor, Beijing Normal-Hong Kong Baptist UniversityVerified email at bnbu.edu.cn
Dragos RotaruCircleVerified email at circle.com
Follow