Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gregor LeanderRuhr University BochumVerified email at rub.de
- María Naya-PlasenciaINRIA ParisVerified email at inria.fr
- Christina BouraIRIF, Université Paris CitéVerified email at irif.fr
- Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Marine MinierProfessor at Université de Lorraine - LORIA LabVerified email at loria.fr
- Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
- Gohar M. KyureghyanUniversity of RostockVerified email at uni-rostock.de
- Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
- Benoit Chevallier-MamesZamaVerified email at zama.ai
- Philippe GaboritProfessor in computer science, university of Limoges, FranceVerified email at unilim.fr
- Seznec AndreINRIA/IRISAVerified email at inria.fr
- Kapali ViswanathanSiemens TechnologyVerified email at siemens.com
- Pascal JunodApplied CryptographerVerified email at junod.info
- Faina Solov'evaSobolev Institute of MathematicsVerified email at math.nsc.ru