Get my own profile
Public access
View all14 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Erich WengerInfineon TechnologiesVerified email at infineon.com
Peter SchwabeProfessor, Radboud University, Nijmegen, The NetherlandsVerified email at cs.ru.nl
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Manfred AignerYagoba GmbHVerified email at yagoba.com
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Peter PesslInfineon TechnologiesVerified email at infineon.com
Honorio Martin GonzalezElectronic Technology Department, Carlos III UniversityVerified email at ing.uc3m.es
Marcel MedwedNXP SemiconductorsVerified email at nxp.com
Marc JoyeZamaVerified email at zama.ai
Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
Amir MoradiRuhr University BochumVerified email at rub.de
Barış EgeRiscure B.V.Verified email at riscure.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Momtchil PeevAIT Austriian Institute of Technology GmbHVerified email at ait.ac.at
Thomas MatyusVerified email at aon.at
Thomas LoruenserScientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Ivan GudymenkoTU DresdenVerified email at tu-dresden.de