Get my own profile
Public access
View all26 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Josep BalaschKU LeuvenVerified email at kuleuven.be
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Roel MaesSynopsysVerified email at synopsys.com
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Jeroen DelvauxVerified email at tii.ae
Erik van der SluisIntrinsic ID BVVerified email at intrinsic-id.com
Filip VeljkovicICEYEVerified email at iceye.fi
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com