Get my own profile
Public access
View all22 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Tomislav NadResearch assistantVerified email at tnad.at
- Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
- Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
- María Naya-PlasenciaINRIA ParisVerified email at inria.fr
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
- Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Emilia KasperSoftware engineer, GoogleVerified email at google.com
- Dmitry KhovratovichEthereum FoundationVerified email at abdkconsulting.com