Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Martijn StamSenior Researcher at Simula UiB, NorwayVerified email at simula.no
Je Hong ParkElectronics and Telecommunications Research InstituteVerified email at nsr.re.kr
Yannick SeurinCryptography Expert, ANSSIVerified email at ssi.gouv.fr
Seongkwang KimSenior Engineer in Samsung SDSVerified email at samsung.com
Yongjin YeomProfessor of Mathematics, Kookmin UniversityVerified email at kookmin.ac.kr
Jihoon ChoHead of Security Resarch Center in Samsung SDSVerified email at samsung.com
Shan ChenSouthern University of Science and Technology (SUSTech)Verified email at sustech.edu.cn
Aaram YunVerified email at ewha.ac.kr
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Joohee LeeAssistant Professor, Sungshin Women's UniversityVerified email at sungshin.ac.kr
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
Peter GažiIOHK ResearchVerified email at iohk.io
Atul LuykxGoogleVerified email at google.com
Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleVerified email at uw.edu
Patrick TagueCarnegie Mellon UniversityVerified email at cmu.edu
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr