Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Barbara GigerlGraz University of TechnologyVerified email at iaik.tugraz.at
Peter PesslInfineon TechnologiesVerified email at infineon.com
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Vedad HadžićPhD Student, TU GrazVerified email at iaik.tugraz.at
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Christine van VredendaalNXP SemiconductorsVerified email at nxp.com
Julius HermelinkMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Rishub NagpalGraz University of TechnologyVerified email at iaik.tugraz.at
Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
Sara ZareiSharif University of TechnologyVerified email at ee.sharif.ir
Hadi SoleimanyShahid Beheshti UniversityVerified email at sbu.ac.ir