Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
- Axel Y. PoschmannVP of ProductVerified email at pqshield.com
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
- David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Xuejia LaiProfessor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
- Chanathip NamprempreAssociate Professor, Reed CollegeVerified email at reed.edu
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Nasour BagheriProfessor of Electrical Engineering, Shahid Rajaee UniversityVerified email at sru.ac.ir
- Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu