Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jong-Seon NoSeoul National University, Department of Electrical and Computer EngineeringVerified email at snu.ac.kr
- Young-Sik KimProfessor, Depart. Electrical Engineering and Computer Science, DGISTVerified email at dgist.ac.kr
- Maxim DeryabinSamsung Advanced Institute of TechnologiesVerified email at samsung.com
- Andrey KimAltbridge, Inc.Verified email at altbridge.ai
- Donghoon YooDesiloVerified email at desilo.ai
- Rakyong ChoiSamsung Advanced Institute of TechnologyVerified email at samsung.com
- Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
- Zeyu LiuColumbia UniversityVerified email at columbia.edu
- Flavio BergamaschiIntel CorporationVerified email at intel.com
- David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
- Sujoy Sinha RoyAssistant Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
- Kurt RohloffAssociate Professor of Computer Science, NJITVerified email at njit.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Vincent ZuccaAssociate Professor, UPVDVerified email at univ-perp.fr
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
- Saraswathy RVPrivacy Engineer/Cryptographer, HP Inc.Verified email at hp.com
- Whan GhangHarvard UniversityVerified email at math.harvard.edu
- Yongjune KimAssistant Professor of Electrical Engineering, POSTECHVerified email at postech.ac.kr
- Ahmet Can MertPostdoctoral Researcher, IAIK, Graz University of TechnologyVerified email at iaik.tugraz.at