Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeProfessor, Radboud University, Nijmegen, The NetherlandsVerified email at cs.ru.nl
Christiane PetersIBMVerified email at be.ibm.com
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Christine van VredendaalNXP SemiconductorsVerified email at nxp.com
Dario CatalanoProfessor of Computer Science, University of CataniaVerified email at dmi.unict.it
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Chen-Mou ChengAssociate Professor, Kanazawa UniversityVerified email at se.kanazawa-u.ac.jp
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Leon Groot BruinderinkVerified email at tue.nl
Tadayoshi KohnoProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Gregory NevenDFINITYVerified email at dfinity.org
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Michael NaehrigResearcher, Microsoft Research, USAVerified email at cryptojedi.org
Marc JoyeZamaVerified email at zama.ai
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Tanja Lange
Professor Cryptology, Technische Universiteit Eindhoven, the Netherlands
Verified email at tue.nl - Homepage