Get my own profile
Public access
View all34 articles
1 article
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Gregor LeanderRuhr University BochumVerified email at rub.de
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Gaëtan LeurentINRIAVerified email at inria.fr
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Stefan KölblGoogleVerified email at mailbox.org
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Daniel KalesTACEO GmbHVerified email at taceo.io
Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org