Get my own profile
Public access
View all40 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Stefan KölblGoogleVerified email at mailbox.org
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Lorenzo GrassiPostDoc, Radboud University, Nijmegen (the Netherlands)Verified email at science.ru.nl
Tim BeyneCOSIC, KU LeuvenVerified email at kuleuven.be
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Markus SchofneggerVerified email at alumni.tugraz.at
Gregor LeanderRuhr University BochumVerified email at rub.de
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de