Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas HainesAustralian National UniversityVerified email at anu.edu.au
Tomasz TruderungComputer Science, University of TrierVerified email at uni-trier.de
David GalindoCTO, Valory AGVerified email at valory.xyz
Véronique CortierCNRS, LORIAVerified email at loria.fr
Enrico ScapinReply S.p.A.Verified email at reply.it
Ivan PryvalovBrandenburg University of TechnologyVerified email at b-tu.de
Rafieh MosahebPhD student, University of LuxembourgVerified email at uni.lu
Jan OupickýSnT/APSIA, University of LuxembourgVerified email at uni.lu
Toomas KripsUniversity of TartuVerified email at ut.ee
Alexander WiesmaierDarmstadt University of Applied SciencesVerified email at h-da.de
Nouri AlnahawiDarmstadt University of Applied Sciences - University of RegensburgVerified email at h-da.de
Kristian GjøsteenNTNUVerified email at ntnu.no
Tjerand SildeAssociate Professor, Norwegian University of Science and TechnologyVerified email at ntnu.no
Peter Browne RønneResearcherVerified email at nbi.dk
Iñigo Querejeta-AzurmendiCryptography Engineer, IOG (IOHK)Verified email at iohk.io
Jintai DingTHUVerified email at uc.edu
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Vonn Kee WongPhD student, University of CincinnatiVerified email at mail.uc.edu
Balázs PejóCrySyS LabVerified email at crysys.hu