Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Seongkwang KimSenior Engineer in Samsung SDSVerified email at samsung.com
- Martijn StamSenior Researcher at Simula UiB, NorwayVerified email at simula.no
- Je Hong ParkElectronics and Telecommunications Research InstituteVerified email at nsr.re.kr
- Jihoon ChoHead of Security Resarch Team in Samsung SDSVerified email at samsung.com
- Wonseok ChoiPostdoc, Purdue UniversityVerified email at purdue.edu
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Joohee LeeAssistant Professor, Sungshin Women's UniversityVerified email at sungshin.ac.kr
- Mincheol SonKAISTVerified email at kaist.ac.kr
- Yongjin YeomProfessor of Mathematics, Kookmin UniversityVerified email at kookmin.ac.kr
- Shan ChenSouthern University of Science and Technology (SUSTech)Verified email at sustech.edu.cn
- Aaram YunVerified email at ewha.ac.kr
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
- Peter GažiIOG ResearchVerified email at iohk.io
- Atul LuykxGoogleVerified email at google.com
- Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleVerified email at uw.edu