Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Ngoc Khanh NguyenÉcole Polytechnique Fédérale de LausanneVerified email at epfl.ch
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch