Crea il mio profilo
Accesso pubblico
Visualizza tutto36 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- Andrey BogdanovCEO/Founder at CYBERCRYPTEmail verificata su cyber-crypt.com
- Atul LuykxGoogleEmail verificata su google.com
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Elmar TischhauserUniversity of MarburgEmail verificata su mathematik.uni-marburg.de
- Damian VizárData Security Scientist, CSEM SwitzerlandEmail verificata su csem.ch
- Arnab RoyUniversität InnsbruckEmail verificata su uibk.ac.at
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Begul BilginRambus Cryptography Research, the NetherlandsEmail verificata su rambus.com
- Qingju Wang (王庆菊)Telecom Paris, Institut Polytechnique de ParisEmail verificata su telecom-paris.fr
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelEmail verificata su cs.haifa.ac.il
- Amit Singh BhatiPhD researcher at COSIC, KU LeuvenEmail verificata su esat.kuleuven.be
- John KelseyNISTEmail verificata su nist.gov
- Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceEmail verificata su lip6.fr
- Gregory NevenChainlink LabsEmail verificata su smartcontract.com
- Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenEmail verificata su esat.kuleuven.be
- NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTEmail verificata su tcgcrest.org
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceEmail verificata su ens.fr
- Jonathan HochWeizmann Institute of ScienceEmail verificata su necam.com
- Thomas ShrimptonProfessor of Computer Science, University of FloridaEmail verificata su ufl.edu