Get my own profile
Public access
View all53 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Josep BalaschKU LeuvenVerified email at kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Arthur BeckersKU LeuvenVerified email at esat.kuleuven.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
Lennert Woutersimec-COSIC, KU LeuvenVerified email at esat.kuleuven.be
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com