Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chen-Mou ChengBTQ AGVerified email at btq.li
Jintai DingTHUVerified email at uc.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Ming-Hsien TsaiNational Taiwan University of Science and TechnologyVerified email at mail.ntust.edu.tw
Vincent HwangMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
yeong-nan yehVerified email at math.sinica.edu.tw
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Chia-Hsin ChenMITVerified email at csail.mit.edu
Po-Chun Kuokbjkuo*at*gmail.comVerified email at nccu.edu.tw
Tung ChouAcademia SinicaVerified email at crypto.tw
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Xiaomu SHIVerified email at szu.edu.cn
Jiaxiang LIUInstitute of Software, Chinese Academy of SciencesVerified email at ios.ac.cn
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Wen-Ding LiCornell UniversityVerified email at cornell.edu
Albrecht PetzoldtFAU Erlangen NurembergVerified email at cs.fau.de
Jonathan McCuneGoogle IncVerified email at google.com