Get my own profile
Public access
View all21 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Tomislav NadResearch assistantVerified email at tnad.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Lars Ramkilde KnudsenDTUVerified email at ramkildeknudsen.dk
Svetla NikovaKU LeuvenVerified email at esat.kuleuven.be
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Dmitry KhovratovichEthereum Foundation and Dusk NetworkVerified email at abdkconsulting.com