Get my own profile
Public access
View all26 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Josep BalaschKU LeuvenVerified email at kuleuven.be
- Roel MaesSynopsysVerified email at synopsys.com
- Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
- Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
- Jeroen DelvauxVerified email at tii.ae
- Erik van der SluisIntrinsic ID BVVerified email at intrinsic-id.com
- Filip VeljkovicICEYEVerified email at iceye.fi
- Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com