Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cn
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Seongkwang KimSenior Engineer in Samsung SDSVerified email at samsung.com
- Martijn StamChief Research Scientist at Simula UiB, NorwayVerified email at simula.no
- Je Hong ParkElectronics and Telecommunications Research InstituteVerified email at nsr.re.kr
- Jihoon ChoHead of Security Resarch Team in Samsung SDSVerified email at samsung.com
- Wonseok ChoiPostdoc, Purdue UniversityVerified email at purdue.edu
- Mincheol SonSchool of Electrical Engineering, KAISTVerified email at kaist.ac.kr
- Joohee LeeAssistant Professor, Sungshin Women's UniversityVerified email at sungshin.ac.kr
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Jihoon KwonSamsung SDSVerified email at samsung.com
- Yongjin YeomProfessor of Mathematics, Kookmin UniversityVerified email at kookmin.ac.kr
- Shan ChenSouthern University of Science and Technology (SUSTech)Verified email at sustech.edu.cn
- Aaram YunVerified email at ewha.ac.kr
- Kazuhiko MinematsuNEC CorporationVerified email at nec.com
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Deukjo Hong전북대학교 컴퓨터인공지능학부 교수Verified email at jbnu.ac.kr
- Stefano TessaroProfessor at the University of WashingtonVerified email at cs.washington.edu