Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mustafa A. MustafaUniversity of Manchester & imec-COSIC KU LeuvenVerified email at manchester.ac.uk
Aysajan Abidinimec-COSIC KU LeuvenVerified email at kuleuven.be
Sara CleemputEmweb bv.Verified email at emweb.be
Dragos RotaruCape PrivacyVerified email at capeprivacy.com
Siemen DhooghePhD student at KU LeuvenVerified email at esat.kuleuven.be
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Mathieu Van VyveProfessor of Operations Research, CORE/LIDAM, UCLouvainVerified email at uclouvain.be
Emmanuela OrsiniKU LeuvenVerified email at kuleuven.be
Nigel SmartKU LeuvenVerified email at kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Tomer AshurKU Leuven & TU EindhovenVerified email at tue.nl
Alan SzepieniecNervos FoundationVerified email at nervos.org
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Eli Ben-SassonCo-founder & President, StarkWareVerified email at starkware.co
Iraklis SymeonidisResearch scientist at RISEVerified email at ri.se
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Olivier PereiraUCLouvainVerified email at uclouvain.be
Édouard CuvelierPost Doctoral researcher, Ph. D., in UCL Crypto Group, ICTEAM, EPL, Université catholique de LouvainVerified email at uclouvain.be
Christina-Angeliki ToliPhD Researcher KU Leuven ESAT- COSIC, BelgiumVerified email at esat.kuleuven.be
Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
Follow
Abdelrahaman Aly
Cryptography Research Centre, Technology Innovation Institute (TII)
Verified email at tii.ae