Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Avijit DuttaInstitute for Advancing Intelligence, TCG-CRESTVerified email at tcgcrest.org
Donghoon ChangIIIT-Delhi, IndiaVerified email at iiitd.ac.in
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Cuauhtemoc MancillasCentro de Investigación y de Estudios Avanzados, CINVESTAV-IPNVerified email at univ-st-etienne.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Rishiraj BhattacharyyaUniversity of BirminghamVerified email at bham.ac.uk
Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Atul LuykxGoogleVerified email at google.com
Avradip MandalZfense LabsVerified email at zfenselabs.com
Shay GueronProfessor, University of Haifa and Distinguished Engineer, MetaVerified email at math.haifa.ac.il
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
John KelseyNISTVerified email at nist.gov
Souradyuti PaulIndian Institute of Technology, BhilaiVerified email at iitbhilai.ac.in
Palash SarkarProfessor, Indian Statistical InstituteVerified email at isical.ac.in