Get my own profile
Public access
View all21 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Joost RenesNXP SemiconductorsVerified email at nxp.com
Christine van VredendaalNXP SemiconductorsVerified email at nxp.com
Olivier BronchainNXP Semiconductors, BelgiumVerified email at nxp.com
Joppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de
Yulia KuzovkovaPQShieldVerified email at pqshield.com
Clément HoffmannUC LouvainVerified email at uclouvain.be
Thorben MoosUniversité catholique de Louvain (UCLouvain)Verified email at uclouvain.be
Vincent GrossoCNRS/ Université Jean Monnet, Laboratoire Hubert Curien, FranceVerified email at univ-st-etienne.fr
Gregor LeanderRuhr University BochumVerified email at rub.de
Bastian RichterHorst Görtz Institute, Ruhr University BochumVerified email at rub.de
Gaëtan CassiersPostdoc, UCLouvainVerified email at uclouvain.be
Anita AghaieHorst Görtz Institut, Ruhr University BochumVerified email at rub.de
Falk SchellenbergMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Shahram RasoolzadehRuhr University BochumVerified email at rub.de
Aein Rezaei ShahmirzadiPQShield LtdVerified email at pqshield.com
Marcel MedwedNXP SemiconductorsVerified email at nxp.com