Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Chen-Mou ChengAssociate Professor, Kanazawa UniversityVerified email at se.kanazawa-u.ac.jp
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Jintai DingUniversity of CincinnatiVerified email at uc.edu
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Peter SchwabeProfessor, Radboud University, Nijmegen, The NetherlandsVerified email at cs.ru.nl
Chia-Hsin ChenMITVerified email at csail.mit.edu
yeong-nan yehVerified email at math.sinica.edu.tw
Hsieh-Chung ChenHarvard UniversityVerified email at seas.harvard.edu
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Jonathan McCuneGoogle IncVerified email at google.com
Ming-Hsien TsaiAcademia SinicaVerified email at iis.sinica.edu.tw
Yueh-Hsun LinCyLab, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Hsu-Chun HsiaoNational Taiwan UniversityVerified email at csie.ntu.edu.tw
King Hang Wang, KevinHong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Charles BouillaguetCRIStAL, university of LilleVerified email at univ-lille.fr
Christopher WolfRuhr-University Bochum, Horst Görtz Institute for IT-SecurityVerified email at christopher-wolf.de
Feng-Hao LiuFlorida Atlantic UniversityVerified email at fau.edu
An-Yeu (Andy) WuProfessor of National Taiwan UniversityVerified email at ntu.edu.tw
Chi-Jen LuResearch Fellow, Institute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Nicolas T. CourtoisUniversity College LondonVerified email at cs.ucl.ac.uk