Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Christof BeierleRuhr University BochumVerified email at rub.de
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Amir MoradiUniversity of Cologne, GermanyVerified email at uni-koeln.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Yu SasakiNTT Secure Platform Labratories
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com