Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Yannick SeurinCryptography Expert, ANSSIVerified email at ssi.gouv.fr
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Xuejia LaiProfessor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Mihir BellareProfessor, Department of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at eng.ucsd.edu
Chanathip NamprempreAssociate Professor, Thammasat UniversityVerified email at engr.tu.ac.th
Nasour BagheriAssociate Professor of Electrical Engineering, Shahid Rajaee UniversityVerified email at sru.ac.ir
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu