Get my own profile
Public access
View all39 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Stefan KölblGoogleVerified email at mailbox.org
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Lorenzo GrassiPostDoc, Radboud University, Nijmegen (the Netherlands)Verified email at science.ru.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Gregor LeanderRuhr University BochumVerified email at rub.de
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Erich WengerInfineon TechnologiesVerified email at infineon.com