Get my own profile
Co-authors
- Donghoon ChangIIIT-Delhi, IndiaVerified email at iiitd.ac.in
- Meltem Sonmez TuranNational Institute of Standards and TechnologyVerified email at nist.gov
- Hong SeokhieCIST, Korea Univ.Verified email at korea.ac.kr
- Jaechul SungProfessor of Mathematics, University of SeoulVerified email at uos.ac.kr
- John KelseyNISTVerified email at nist.gov
- Çağdaş ÇalıkMicrosoftVerified email at microsoft.com
- Changhoon LeeProfessor of Seoul National University of Science & Technology (SeoulTech)Verified email at seoultech.ac.kr
- Sangjin LeeDFRC, ICSP, School of Cyber Security, Korea Univ.Verified email at korea.ac.kr
- Jongsung KimDept. of Mathematics & Dept. of Financial Information Security, Kookmin University, Republic of KoreaVerified email at kookmin.ac.kr
- Kyungho LeeKorea UniversityVerified email at korea.ac.kr
- Shubham GoswamiComputer Vision Engineer, Level AI https://thelevel.aiVerified email at iiitd.ac.in
- Munawar HasanNISTVerified email at nist.gov
- Megha AgrawalIIIT DelhiVerified email at iiitd.ac.in
- Sang-Soo YeoMokwon UniversityVerified email at mokwon.ac.kr
- Somitra SanadhyaDept. of CSE, IIT JodhpurVerified email at iitj.ac.in
- Nicky MouhaResearcher, NISTVerified email at nist.gov