Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Stefan KölblGoogleVerified email at mailbox.org
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Gaëtan LeurentINRIAVerified email at inria.fr
Amir MoradiRuhr University Bochum, GermanyVerified email at rub.de
Christof BeierleRuhr University BochumVerified email at rub.de
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Gregor LeanderRuhr University BochumVerified email at rub.de
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Florian SagstetterResearch AssociateVerified email at tum-create.edu.sg
Follow