Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Markus SchofneggerVerified email at alumni.tugraz.at
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Gaëtan LeurentINRIAVerified email at inria.fr
Stefan KölblGoogleVerified email at mailbox.org
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Daniel KalesTACEO GmbHVerified email at taceo.io
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at