Get my own profile
Public access
View all52 articles
15 articles
available
not available
Based on funding mandates
Co-authors
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- "xiangxue li"East China Normal UniversityVerified email at cs.ecnu.edu.cn
- Olivier PereiraUCLouvainVerified email at uclouvain.be
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
- Quisquater Jean-JacquesUCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
- Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Shi-Feng SunShanghai Jiao Tong University, ChinaVerified email at sjtu.edu.cn
- John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Tsz Hon YuenMonash UniversityVerified email at monash.edu
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu