Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Seongkwang KimSenior Engineer in Samsung SDSVerified email at samsung.com
Martijn StamChief Research Scientist at Simula UiB, NorwayVerified email at simula.no
Je Hong ParkElectronics and Telecommunications Research InstituteVerified email at nsr.re.kr
Wonseok ChoiPostdoc, Purdue UniversityVerified email at purdue.edu
Jihoon ChoHead of Security Resarch Team in Samsung SDSVerified email at samsung.com
Mincheol SonSchool of Electrical Engineering, KAISTVerified email at kaist.ac.kr
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Joohee LeeAssistant Professor, Sungshin Women's UniversityVerified email at sungshin.ac.kr
Yongjin YeomProfessor of Mathematics, Kookmin UniversityVerified email at kookmin.ac.kr
Shan ChenSouthern University of Science and Technology (SUSTech)Verified email at sustech.edu.cn
Aaram YunVerified email at ewha.ac.kr
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Deukjo Hong전북대학교 컴퓨터인공지능학부 교수Verified email at jbnu.ac.kr
Stefano TessaroUniversity of WashingtonVerified email at cs.washington.edu
Peter GažiIOG ResearchVerified email at iohk.io
Atul LuykxGoogleVerified email at google.com