Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
- Erich WengerInfineon TechnologiesVerified email at infineon.com
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Manfred AignerYagoba GmbHVerified email at yagoba.com
- Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
- Peter PesslInfineon TechnologiesVerified email at infineon.com
- Honorio Martin GonzalezElectronic Technology Department, Carlos III UniversityVerified email at ing.uc3m.es
- Marcel MedwedNXP SemiconductorsVerified email at nxp.com
- Barış EgeRiscure B.V.Verified email at riscure.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
- Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
- Ivan GudymenkoTU DresdenVerified email at tu-dresden.de
- Momtchil PeevHuawei Technologies Duesseldorf GmbHVerified email at huawei.com
- Thomas MatyusVerified email at aon.at
- Thomas LoruenserSenior Scientist, AIT Austrian Institute of TechnologyVerified email at ait.ac.at