Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Barbara GigerlGraz University of TechnologyVerified email at iaik.tugraz.at
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Peter PesslInfineon TechnologiesVerified email at infineon.com
- Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
- Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
- Vedad HadžićPhD Candidate, TU GrazVerified email at iaik.tugraz.at
- Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
- Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
- Rishub NagpalGraz University of TechnologyVerified email at iaik.tugraz.at
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
- Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Christine van VredendaalNXP SemiconductorsVerified email at nxp.com
- Julius HermelinkMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
- Thomas SchambergerChair of Security in Information Technology, Technical University of MunichVerified email at tum.de
- Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
- Sara ZareiSharif University of TechnologyVerified email at ee.sharif.ir