Get my own profile
Public access
View all7 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Nicolas Veyrat-CharvillonUbisoft AnnecyVerified email at ubisoft.com
- Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Michael HutterPQShield LtdVerified email at pqshield.com
- Mathieu RenauldPhD in Cryptology, Université catholique de Louvain (UCL)Verified email at uclouvain.be
- Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
- Antoine JouxCISPAVerified email at cispa.saarland
- Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
- Johann HeyszlGoogle | OpenTitanVerified email at google.com
- Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
- Marcin WójcikVerified email at cam.ac.uk