Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Michael ScottMIRACL Labs, Dublin, IrelandVerified email at miracl.com
Francisco Rodríguez-HenríquezTechnology Innovation Center: Cryptography Research Centre of the Technology Innovation CentreVerified email at cs.cinvestav.mx
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Anthony Van HerrewegeKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Chen-Mou ChengBTQ AGVerified email at btq.li
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Leif UhsadelKU Leuven (COSIC), Belgium and NTU (PACE), SingaporeVerified email at esat.kuleuven.be
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Junfeng FanOpen Security ResearchVerified email at opsefy.com
shigeo MITSUNARICybozu Labs, Inc.Verified email at nifty.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Nareli Cruz-CortésCIC-IPNVerified email at cic.ipn.mx