Calculated based on number of publications stored in Pure and citations from Scopus
1993 …2024

Research activity per year

Network

Dieter S. Schmidt

  • University of Cincinnati
  • University of Cincinnati
  • Dept. of ECECS

External person

Albrecht Petzoldt

  • National Institute of Standards and Technology
  • Technische Universität Darmstadt
  • Friedrich-Alexander University Erlangen-Nürnberg
  • Kyushu University

External person

Bo Yin Yang

  • Academia Sinica Taiwan
  • Academia Sinica - Institute of Information Science

External person

Hu Lei

  • State Key Laboratory of Information Security
  • Chinese Academy of Sciences
  • University of Chinese Academy of Sciences
  • CAS - Institute of Information Engineering

External person

Johannes Buchmann

  • Technische Universität Darmstadt
  • South China University of Technology

External person

Mohamed Saied Emam Mohamed

  • Technische Universität Darmstadt

External person

Chengdong Tao

  • South China University of Technology
  • Beijing Institute of Mathematical Sciences and Applications

External person

Tsuyoshi Takagi

  • The University of Tokyo
  • Kyushu University
  • Japan Science and Technology Agency

External person

Xuyun Nie

  • University of Electronic Science and Technology of China
  • Chinese Academy of Sciences
  • State Key Laboratory of Information Security

External person

Chi Cheng

  • China University of Geosciences, Wuhan
  • Guilin University of Electronic Technology
  • State Key Laboratory of Cryptology

External person

Joshua Deaton

  • University of Cincinnati

External person

Ming Shing Chen

  • Academia Sinica Taiwan
  • Academia Sinica - Institute of Information Science
  • National Taiwan University

External person

Jason E. Gower

  • University of Cincinnati

External person

S. Khoroshkin

  • Alikhanov Institute for Theoretical and Experimental Physics

External person

John Baena

  • University of Cincinnati
  • Universidad Nacional de Colombia

External person

Crystal Lee Clough

  • Nanyang Technological University
  • University of Cincinnati

External person

Timothy J. Hodges

  • University of Cincinnati

External person

Xinwei Gao

  • Beijing Jiaotong University

External person

Zhijun Yin

  • University of Cincinnati

External person

Yanbin Pan

  • Chinese Academy of Sciences
  • CAS - Academy of Mathematics and System Sciences

External person

Chen Mou Cheng

  • National Taiwan University

External person

Zheng Zhang

  • University of Cincinnati

External person

Xin Jiang

  • Chinese Academy of Sciences
  • University of Chinese Academy of Sciences

External person

Vishakha

  • University of Cincinnati

External person

Shaohua Tang

  • South China University of Technology

External person

Hong Xiang

  • Ministry of Education China
  • Chongqing University

External person

Jianyu Li

  • State Key Laboratory of Information Security

External person

Wael Said Abd Elmageed Mohamed

  • Technische Universität Darmstadt

External person

Lin Li

  • Beijing Jiaotong University

External person

Yuntao Wang

  • Kyushu University
  • The University of Tokyo
  • Osaka University

External person

John Wagner

  • University of Cincinnati

External person

Daniel Cabarcas

  • University of Cincinnati

External person

Boris Feigin

  • RAS - Landau Institute for Theoretical Physics
  • Kyoto University

External person

Jiqiang Liu

  • Beijing Jiaotong University

External person

Yue Qin

  • China University of Geosciences, Wuhan
  • State Key Laboratory of Cryptology
  • Yanqi Lake Beijing Institute of Mathematical Sciences and Applications
  • Yanqi Lake Beijing Institute of Mathematical Sciences and Applications

External person

Fabian Werner

  • Technische Universität Darmstadt

External person

Saed Alsayigh

  • University of Cincinnati

External person

Weiwei Cao

  • State Key Laboratory of Information Security
  • University of Chinese Academy of Sciences

External person

Kouichi Sakurai

  • Kyushu University

External person

Zhe Liu

  • University of Luxembourg
  • Nanjing University of Aeronautics and Astronautics

External person

Daniel Smith-Tone

  • University of Louisville
  • National Institute of Standards and Technology

External person

C. Wolf

  • KU Leuven
  • Ecole Normale Supérieur

External person

Hao Guo

  • Beijing Institute of Mathematical Sciences and Applications
  • Tsinghua University

External person

Andrey Bogdanov

  • Ruhr University Bochum

External person

Harold W. Carter

  • University of Cincinnati
  • University of Cincinnati

External person

R. V. Saraswathy

  • University of Cincinnati

External person

Saraswathy Rv

  • University of Cincinnati

External person

Shai Halevi

  • Algorand Foundation

External person

Kurt Schmidt

  • University of Cincinnati

External person

Sundar Balasubramanian

  • University of Cincinnati
  • University of Cincinnati

External person

Victoria Kruglov

  • University of Cincinnati

External person

Momonari Kudo

  • Kyushu University
  • Kobe City College of Technology

External person

S. Pakuliak

  • Joint Institute for Nuclear Research
  • NASU - Bogolyubov Institute for Theoretical Physics
  • Alikhanov Institute for Theoretical and Experimental Physics

External person

Shinya Okumura

  • Kyushu University
  • Osaka University
  • Institute of Systems, Information Technologies and Nanotechnologies

External person

Michael Snook

  • University of Cincinnati

External person

Scott Fluhrer

  • Cisco Systems

External person

Stanislav Bulygin

  • Center for Advanced Security Research

External person

Jaiberth Porras

  • Universidad Nacional de Colombia

External person

Olivier Billet

  • Orange Labs

External person

Kenji Iohara

  • Kyoto University

External person

Adama Diene

  • University of Cincinnati
  • Central State University
  • United Arab Emirates University

External person

Andy Rupp

  • Ruhr University Bochum

External person

Rui Xu

  • State Key Laboratory of Cryptology
  • Guilin University of Electronic Technology
  • China University of Geosciences, Wuhan

External person

András Gilyén

  • California Institute of Technology

External person

Xi Hu

  • Chongqing University

External person

Jiang Zhang

  • CAS - Institute of Software

External person

Seungki Kim

  • University of Cincinnati

External person

Yi Hao Chiu

  • National Taiwan University

External person

Martin Albrecht

  • Royal Holloway University of London

External person

Manuel Goulão

  • Instituto de Telecomunicações
  • University of Lisbon

External person

Lv Shuwang

  • State Key Laboratory of Information Security

External person

Bin Cai

  • Ministry of Education China
  • Chongqing University

External person

Jean Lancrenon

  • University of Luxembourg

External person

Tao Xiang

  • Chongqing University

External person

Andrei Pyshkin

  • Technische Universität Darmstadt

External person

Liu Fen

  • State Key Laboratory of Information Security

External person

Ruoyu Ding

  • State Key Laboratory of Cryptology
  • China University of Geosciences, Wuhan

External person

Lih chung Wang

  • National Dong Hwa University

External person

Huan Chen

  • South China University of Technology

External person

Yingpu Deng

  • Chinese Academy of Sciences

External person

Özgür Dagdelen

  • Technische Universität Darmstadt

External person

Zhiping Wu

  • State Key Laboratory of Information Security

External person

Jianqiang Li

  • Pennsylvania State University

External person

Travis Morrison

  • Virginia Polytechnic Institute and State University

External person

Lingling Xu

  • South China University of Technology

External person

Jiahui Chen

  • Guangdong University of Technology

External person

Jeremy Erickson

  • University of North Carolina at Chapel Hill

External person

Takanori Yasuda

  • Institute of Systems, Information Technologies and Nanotechnologies

External person

Yacheng Wang

  • The University of Tokyo

External person

Niu Liu

  • South China University of Technology

External person

Nina Bindel

  • SandboxAQ

External person

M. U. Siddiqi

  • Multimedia University

External person

Fengli Zhang

  • University of Electronic Science and Technology of China

External person

Dingfeng Ye

  • State Key Laboratory of Information Security

External person

Kirill Morozov

  • University of North Texas

External person

Vlad Gheorghiu

  • University of Waterloo

External person

Bei Liang

  • Yanqi Lake Beijing Institute of Mathematical Sciences and Applications

External person

Shuhei Nakamura

  • Nihon University

External person

Jeffrey Hoffstein

  • Brown University

External person

Alan Szepieniec

  • IMinds
  • KU Leuven

External person

Bart Preneel

  • IMinds
  • KU Leuven

External person

Tetsuji Miwa

  • Kyoto University

External person

Amit Sahai

  • University of California at Los Angeles

External person

Lih Chung Wang

  • National Dong Hwa University

External person

Eric Li Hsiang Kuo

  • Academia Sinica Taiwan

External person

Chris Christensen

  • Northern Kentucky University

External person

Wei Chih Hong

  • Academia Sinica Taiwan

External person

Yasuhiko Ikematsu

  • Kyushu University

External person

Qinglong Wang

  • Chang'an University

External person

Paulo Mateus

  • Instituto de Telecomunicações
  • University of Lisbon

External person

Ji Wen

  • State Key Laboratory of Information Security

External person

Dustin Moody

  • National Institute of Standards and Technology

External person

Naihuan Jing

  • North Carolina State University
  • Mathematical Sciences Research Institute

External person

Jianting Ning

  • National University of Singapore

External person

Crystal Updegrove

  • University of Cincinnati

External person

Rainer Steinwandt

  • Florida Atlantic University

External person

Xinyi Huang

  • Fujian Normal University

External person

Satya Lokam

  • Microsoft USA

External person

Kim Laine

  • Microsoft USA

External person

Chia Hsin Owen Chen

  • Academia Sinica Taiwan

External person

Shafi Goldwasser

  • Simons Institute

External person

Owen Chia Hsin Chen

  • Academia Sinica - Institute of Information Science

External person

Chen Ji

  • Ministry of Education China
  • Chongqing University

External person

Xu Wang

  • University of Science and Technology of China

External person

Zhiming Yang

  • South China University of Technology

External person

Roberto Araujo

  • Universidade Federal do Pará

External person

Frost Yu Shuang Lee

  • National Taiwan University

External person

Daniele Micciancio

  • University of California at San Diego

External person

Bo yin Yang

  • Chinese Academy of Sciences

External person

Kevin Schmitt

  • University of Cincinnati

External person

Melissa Chase

  • Microsoft USA

External person

Tien Ren Chen

  • Academia Sinica Taiwan

External person

Jun Sang

  • Ministry of Education China
  • Chongqing University

External person

Zhiguang Qin

  • University of Electronic Science and Technology of China

External person

Stefan Tohneanu

  • University of Cincinnati

External person

Ray Perlner

  • National Institute of Standards and Technology

External person

Huaxiong Wang

  • Nanyang Technological University

External person

Xiaohan Zhang

  • China University of Geosciences, Wuhan

External person

Anna Inn Tung Chen

  • National Taiwan University

External person

Zhen Liu

  • Hubei University

External person

Sean Hallgren

  • Pennsylvania State University

External person

Li Ping Chou

  • Chinese Culture University

External person

Qingxuan Wang

  • State Key Laboratory of Cryptology
  • Nankai University

External person

Ziyu Zhao

  • Tsinghua University

External person

Pedro Branco

  • Instituto de Telecomunicações
  • University of Lisbon

External person

Xiling Tang

  • South China University of Technology

External person

Jean Pierre Tillich

  • Institut national de recherche en informatique et en automatique

External person

Sergey Gorbunov

  • University of Waterloo

External person

Haibo Yi

  • South China University of Technology

External person

Peigen Li

  • Beijing Institute of Mathematical Sciences and Applications
  • Tsinghua University

External person

Vinod Vaikuntanathan

  • Massachusetts Institute of Technology

External person

Xiaodong Lin

  • Rutgers - The State University of New Jersey, New Brunswick

External person

Jie Ling

  • Guangdong University of Technology

External person

Guomin Chen

  • South China University of Technology

External person

Ralf Philipp Weinmann

  • Technische Universität Darmstadt

External person

Lu Ning Xia

  • Beijing Certificate Authority Co. Ltd.

External person

Bok Min Goi

  • Multimedia University

External person

Igor B. Frenkel

  • Yale University

External person

Zhenfeng Zhang

  • CAS - Institute of Software

External person

Ai Ren

  • University of Cincinnati

External person