Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Christof BeierleRuhr University BochumVerified email at rub.de
- Jérémy JEANANSSIVerified email at ssi.gouv.fr
- Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
- Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
- Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
- Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
- Yu SasakiNTT Secure Platform Labratories
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com