Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mustafa A. MustafaUniversity of Manchester & COSIC KU LeuvenVerified email at manchester.ac.uk
Sara CleemputEmweb bv.Verified email at emweb.be
Aysajan AbidinKU LeuvenVerified email at kuleuven.be
Dragos RotaruGatewayVerified email at mygateway.xyz
Tim WoodKU Leuven, University of BristolVerified email at kuleuven.be
Mathieu Van VyveProfessor of Operations Research, CORE/LIDAM, UCLouvainVerified email at uclouvain.be
Emmanuela OrsiniBocconi UniversityVerified email at kuleuven.be
Nigel SmartKU LeuvenVerified email at kuleuven.be
Tomer Ashur3MI LabsVerified email at 3milabs.tech
Alan SzepieniecVerified email at neptune.cash
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Victor SucasasTechnology Innovation Institute (Abu Dhabi) - Cryptography Research CentreVerified email at tii.ae
Iraklis SymeonidisResearch scientist at RISEVerified email at ri.se
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Olivier PereiraUCLouvainVerified email at uclouvain.be
Édouard CuvelierPost Doctoral researcher, Ph. D., in UCL Crypto Group, ICTEAM, EPL, Université catholique de LouvainVerified email at uclouvain.be
Christina-Angeliki ToliPhD Researcher KU Leuven ESAT- COSIC, BelgiumVerified email at esat.kuleuven.be
Emad Heydari BeniNokia Bell Labs + COSIC (KU Leuven)Verified email at kuleuven.be
Bert LagaisseAssociate Professor, KU LeuvenVerified email at cs.kuleuven.be
Follow
Abdelrahaman Aly
Cryptography Research Centre, Technology Innovation Institute (TII)
Verified email at tii.ae