Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Gregor LeanderRuhr University BochumVerified email at rub.de
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Gaëtan LeurentINRIAVerified email at inria.fr
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Stefan KölblGoogleVerified email at mailbox.org
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Daniel KalesTACEO GmbHVerified email at taceo.io
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr