Get my own profile
Public access
View all45 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Christof BeierleRuhr University BochumVerified email at rub.de
Lars Ramkilde KnudsenDTUVerified email at ramkildeknudsen.dk
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Amir MoradiRuhr University Bochum, GermanyVerified email at rub.de
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Stefan KölblGoogleVerified email at mailbox.org
Patrick FelkeProfessor IT-Security, University of Applied Sciences Emden/LeerVerified email at hs-emden-leer.de
Tolga YalcinGoogle, San DiegoVerified email at google.com
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at rub.de
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr