Get my own profile
Public access
View all30 articles
1 article
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Stefan KölblGoogleVerified email at mailbox.org
Markus SchofneggerGraz University of TechnologyVerified email at tugraz.at
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Gaëtan LeurentINRIAVerified email at inria.fr
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Daniel KalesGraz University of TechnologyVerified email at iaik.tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to