Get my own profile
Public access
View all54 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Josep BalaschKU LeuvenVerified email at kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Arthur BeckersKU LeuvenVerified email at esat.kuleuven.be
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Lennert WoutersCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com