Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nuttapong AttrapadungAIST, JapanVerified email at aist.go.jp
Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Shuichi KatsumataPQShield Ltd.Verified email at pqshield.com
Shweta AgrawalIndian Institute of Technology MadrasVerified email at iitm.ac.in
Noboru KunihiroUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
Ryo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com
Koji NuidaKyushu UniversityVerified email at imi.kyushu-u.ac.jp
Monosij MaitraIIT KharagpurVerified email at cse.iitkgp.ac.in
Alex DavidsonFaculdade de Ciências, Universidade de Lisboa, LASIGEVerified email at fc.ul.pt
Anshu YadavIST AustriaVerified email at ist.ac.at
Damien StehléCryptoLabVerified email at cryptolab.co.kr
Sanjay BhattacherjeeUniversity of KentVerified email at kent.ac.uk
Keita EmuraKanazawa UniversityVerified email at se.kanazawa-u.ac.jp
Kazuto OgawaVerified email at nhk.or.jp
PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
TAPAS PALCo-Leader of KASTEL-C&C (KIT)Verified email at kit.edu
Bagus SantosoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
Hiraku MoritaAarhus University, University of CopenhagenVerified email at cs.au.dk
Satsuya OhataByerlis Inc.Verified email at byerlis.jp
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu