Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hyuk-Jae LeeSeoul National University, Department of Electrical and Computer EngineeringVerified email at capp.snu.ac.kr
Rob A. RutenbarProfessor of Computer Science and Electrical and Computer Engineering, University of PittsburghVerified email at pitt.edu
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Keewoo LeeUC BerkeleyVerified email at berkeley.edu
Wonhee ChoSeoul National UniversityVerified email at snu.ac.kr
Jin-Sung KimSunMoon UniversityVerified email at sunmoon.ac.kr
Donghyeon LeeQualcomm Technologies, Inc.Verified email at capp.snu.ac.kr
Hyokeun LeeAjou UniversityVerified email at ajou.ac.kr
Yujin NamUniversity of California, San DiegoVerified email at ucsd.edu
Chae Eun RheeProfessor, Hanyang UniversityVerified email at hanyang.ac.kr
Hyun KimAssociate Professor, Seoul National University of Science and TechnologyVerified email at seoultech.ac.kr
Yongsoo SongSeoul National UniversityVerified email at snu.ac.kr
Miran KimHanyang UniversityVerified email at hanyang.ac.kr
Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
Radames Cruz MorenoMicrosoft CorporationVerified email at microsoft.com
Nicolas GamaChief Computer Scientist, Inpher and AP, Cryptologie, Université de VersaillesVerified email at uvsq.fr
Anamaria CostacheNorwegian University of Science and TechnologyVerified email at ntnu.no
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Kim LainePrincipal Research Manager, MicrosoftVerified email at microsoft.com
Hyunmin JungSeoul National University of Science and TechnologyVerified email at seoultech.ac.kr