Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Jong-Seon NoSeoul National University, Department of Electrical and Computer EngineeringVerified email at snu.ac.kr
Young-Sik KimProfessor, Depart. Electrical Engineering and Computer Science, DGISTVerified email at dgist.ac.kr
Maxim DeryabinSamsung Advanced Institute of TechnologiesVerified email at samsung.com
Andrey KimAltbridge, Inc.Verified email at altbridge.ai
Donghoon YooDesiloVerified email at desilo.ai
Rakyong ChoiSamsung Advanced Institute of TechnologyVerified email at samsung.com
Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
Zeyu LiuColumbia UniversityVerified email at columbia.edu
Flavio BergamaschiIntel CorporationVerified email at intel.com
Kurt RohloffAssociate Professor of Computer Science, NJITVerified email at njit.edu
Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
Vincent ZuccaAssociate Professor, UPVDVerified email at univ-perp.fr
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
Saraswathy RVPrivacy Engineer/Cryptographer, HP Inc.Verified email at hp.com
Whan GhangHarvard UniversityVerified email at math.harvard.edu
Yongjune KimAssistant Professor of Electrical Engineering, POSTECHVerified email at postech.ac.kr
Sujoy Sinha RoyAssociate Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Ahmet Can MertResearcherVerified email at sabanciuniv.edu