Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
- Fangfei LiuIntel CorporationVerified email at intel.com
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Robert PrimasIntel LabsVerified email at intel.com
- Robert SchillingRivos Inc.Verified email at rivosinc.com
- Erich WengerInfineon TechnologiesVerified email at infineon.com
- Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Raphael SpreitzerSGSVerified email at sgs.com
- Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Josep TorrellasProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
- Christopher W. FletcherUniversity of California, BerkeleyVerified email at berkeley.edu
- Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
- Luca BeniniETH Zürich, Università di BolognaVerified email at unibo.it
- Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Follow