Get my own profile
Public access
View all62 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Sujoy Sinha RoyAssistant Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Nigel SmartKU LeuvenVerified email at kuleuven.be
Wouter CastryckKU LeuvenVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Jan-Pieter D'AnversResearcher, KU LeuvenVerified email at esat.kuleuven.be
Angshuman KarmakarResearch associate, COSIC, KU LeuvenVerified email at esat.kuleuven.be
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Ilia IliashenkoPyteVerified email at pyte.ai
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
Jens HermansCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Eleftheria MakriAssistant Professor at LIACS, Leiden University, The Netherlands; Free Researcher KU Leuven, BelgiumVerified email at liacs.leidenuniv.nl
Ward BeullensPostdoc at IBM Research ZurichVerified email at zurich.ibm.com
Charlotte BonteKU LeuvenVerified email at esat.kuleuven.be
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Christophe DocheAssociate ProfessorVerified email at aibihe.edu.au
Follow
