Get my own profile
Public access
View all43 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan KölblGoogleVerified email at mailbox.org
Tim BeyneCOSIC, KU LeuvenVerified email at kuleuven.be
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Gregor LeanderRuhr University BochumVerified email at rub.de