Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Erich WengerInfineon TechnologiesVerified email at infineon.com
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Manfred AignerUB für DisseminationVerified email at dissemination.at
Honorio Martin GonzalezElectronic Technology Department, Carlos III UniversityVerified email at ing.uc3m.es
Peter PesslInfineon TechnologiesVerified email at infineon.com
Marcel MedwedNXP SemiconductorsVerified email at nxp.com
Barış EgeRiscure B.V.Verified email at riscure.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Ivan GudymenkoTU DresdenVerified email at tu-dresden.de
Momtchil PeevHuawei Technologies Duesseldorf GmbHVerified email at huawei.com
Thomas MatyusVerified email at aon.at
Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at