Skip to content
View Jan-nku's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report Jan-nku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
@tamarin-prover
Tamarin prover tamarin-prover
A tool for the formal analysis of security protocols
@machi12
machi12
或许是不知梦的缘故,流离之人追逐幻影

北京邮电大学 山东省青岛市

@nglaeser
Noemi Glaeser nglaeser
Applied cryptographer • Crypto(graphy) for crypto(currency) • PhD'24 UMD & MPI-SP
@cryspen
Cryspen cryspen
High Assurance Software & Tools

France

@rozbb
Michael Rosenberg rozbb
PhD in cryptography. PM me your orphan blocks
@lducas
Léo Ducas lducas
I break codes for a living. Sometimes I make one.

CWI Amsterdam

@GiacomoPope
Giacomo Pope GiacomoPope
Co-Founder of @cryptohack // Crypto Services @nccgroup

@NCCGroup

@freedomFu
Yanduo Fu freedomFu
Do it anyway.

Nankai University Tianjin, China

@Hughshine
Xuyang Li Hughshine
FM, SE, PL, CS, HCI. 2nd year Phd Student @Purdue.

West Lafayette

@wangxiao1254
Xiao Wang wangxiao1254
Cryptographer

Northwestern University Evanston, IL

@zhenfeizhang
zhenfei zhenfeizhang
cryptographer, blockchain engineer, rustacean.
@zxjcarrot
Xinjing Zhou zxjcarrot
PhD Student @ MIT DSG
@cpeikert
Chris Peikert cpeikert
Cryptography (lattices/post-quantum) Professor at University of Michigan. Head of cryptography research at Algorand.

University of Michigan Ann Arbor, MI

@packgenome
PackGenome packgenome
PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
@chosen-instruction-attack
Chosen-Instruction Attack chosen-instruction-attack
Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators
@idealeer
Xiang Li idealeer
Associate Professor

Nankai University China

@Dod-o
Tengchao Lv Dod-o

Microsoft Research Asia China

@ErwinSCat
Xiaojie Guo ErwinSCat
Interested in cryptography, secure computation, and so on.

Shanghai Qi Zhi Institute Shanghai, China

@houqb
Qibin Hou houqb
Associate Professor at Nankai University

Nankai University China

@nsg-ethz
Networked Systems Group (NSG) nsg-ethz
Research group in Computer Networks at ETH Zürich

Zürich, Switzerland

@p4lang
p4language p4lang
Home to all official projects of the P4 language organization.
@Yangqing
Yangqing Jia Yangqing
Startup. Former VP @alibaba. Ex-@facebook @google @BVLC. Created Caffe, @caffe2, @onnx. Co-led @pytorch 1.0. @tensorflow contributor. @ucberkeley alumni.

Berkeley

@zhouyangpkuer
zhouyang zhouyangpkuer
Senior student@Peking University. Broadly interested in database and networking algorithms and systems. Now applying for Ph.D. position of network or database.
@Ching-Yee-Chan
Jiankun ZHAO Ching-Yee-Chan
Stay Hungry, Stay Fool
@zouxianyu
zouxianyu zouxianyu
coding for fun

Nankai University Solana

@michelle19l
michelle19l
a master student studying in Nankai University
@shesl-meow
BruceWayne shesl-meow
TikTok Search Ads Algo

Nankai University Shanghai,China

@cctv1005s
Li Yang cctv1005s
NodeJS developer

@getjerry America

@Youggls
Perry Li Youggls
Bachelor of SE, Master of CS, NLP Researcher

Shanghai China

@Tr0py
Ziyi Zhao Tr0py
With a dream

Rice University Texas, USA