Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chen-Mou ChengBTQ AGVerified email at btq.li
Jintai DingUniversity of CincinnatiVerified email at uc.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Chia-Hsin ChenMITVerified email at csail.mit.edu
yeong-nan yehVerified email at math.sinica.edu.tw
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Ming-Hsien TsaiAcademia SinicaVerified email at iis.sinica.edu.tw
Jonathan McCuneGoogle IncVerified email at google.com
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Yueh-Hsun LinApple Inc.Verified email at andrew.cmu.edu
Hsu-Chun HsiaoNational Taiwan UniversityVerified email at csie.ntu.edu.tw
King Hang Wang, KevinHong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Christopher WolfRuhr-University Bochum, Horst Görtz Institute for IT-SecurityVerified email at christopher-wolf.de
Feng-Hao LiuFlorida Atlantic UniversityVerified email at fau.edu
Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
An-Yeu (Andy) WuProfessor of National Taiwan UniversityVerified email at ntu.edu.tw
Chi-Jen LuResearch Fellow, Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw