Get my own profile
Public access
View all40 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan KölblGoogleVerified email at mailbox.org
Ruben NiederhagenAssistant Professor, Department of Mathematics and Computer Science (IMADA), University of SouthernVerified email at polycephaly.org
Lorenzo GrassiPostDoc, Radboud University, Nijmegen (the Netherlands)Verified email at science.ru.nl
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Gregor LeanderRuhr University BochumVerified email at rub.de
Erich WengerInfineon TechnologiesVerified email at infineon.com
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be