Get my own profile
Public access
View all49 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Antoon BosselaersKU LeuvenVerified email at esat.kuleuven.be
Kerem VarıcıMastercardVerified email at mastercard.com
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Tomer Ashur3MI LabsVerified email at 3milabs.tech
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de