Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Damien StehléENS de LyonVerified email at ens-lyon.fr
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
Léo DucasCWI, Amsterdam, The NetherlandsVerified email at cwi.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
John M. SchanckUniversity of WaterlooVerified email at uwaterloo.ca
Ngoc Khanh NguyenÉcole Polytechnique Fédérale de LausanneVerified email at epfl.ch
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Matthias J. KannwischerInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Ueli MaurerProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch