Get my own profile
Public access
View all6 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Nicolas Veyrat-CharvillonUbisoft AnnecyVerified email at ubisoft.com
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Michael HutterPQShield LtdVerified email at pqshield.com
Antoine JouxCISPAVerified email at cispa.saarland
Mathieu RenauldPhD in Cryptology, Université catholique de Louvain (UCL)Verified email at uclouvain.be
Christophe PetitUniversité libre de Bruxelles - University of Birmingham - University of OxfordVerified email at ulb.be
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Johann HeyszlGoogle | OpenTitanVerified email at google.com
Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
Marcin WójcikVerified email at cam.ac.uk