Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Zahra AhmadianAssistant Professor, Shahid Beheshti UniversityVerified email at sbu.ac.ir
Håvard RaddumSimula Research LaboratoryVerified email at simula.no
Aein Rezaei ShahmirzadiPQShield LtdVerified email at pqshield.com
Mahmoud SalmasizadehAssociate Professor Electronics Research Institute, Sharif University of TechnologyVerified email at sharif.ir
Mohammad Reza ArefProfessor of Electrical Engineering, Sharif university of TechnologyVerified email at sharif.edu
Thorben MoosUniversité catholique de Louvain (UCLouvain)Verified email at uclouvain.be
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christof BeierleRuhr University BochumVerified email at rub.de
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Yanis BelkheyarPhD student in cryptography, Radboud University NetherlandVerified email at ru.nl
Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
Tobias SchneiderNXP Semiconductors, Gratkorn, AustriaVerified email at rub.de
Falk SchellenbergMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Anita AghaieHorst Görtz Institut, Ruhr University BochumVerified email at rub.de
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Dušan BožilovVerified email at pqshield.com