Get my own profile
Public access
View all69 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Nigel SmartKU LeuvenVerified email at kuleuven.be
Sujoy Sinha RoyAssociate Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Wouter CastryckKU LeuvenVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Jan-Pieter D'AnversResearcher, KU LeuvenVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Angshuman KarmakarAssistant Professor, Department of Computer Science and Engineering, IIT KanpurVerified email at cse.iitk.ac.in
Ilia IliashenkoInversed TechVerified email at inversed.tech
Jens HermansCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Daniel PageSchool of Computer Science, University of BristolVerified email at cs.bris.ac.uk
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Eleftheria MakriAssistant Professor at LIACS, Leiden University, The Netherlands; Free Researcher KU Leuven, BelgiumVerified email at liacs.leidenuniv.nl
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Ward BeullensResearcher at IBM Research ZurichVerified email at zurich.ibm.com
Charlotte BonteKU LeuvenVerified email at esat.kuleuven.be
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Carl BootlandKU LeuvenVerified email at esat.kuleuven.be
Follow
