Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Tomislav NadResearch assistantVerified email at tnad.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Dmitry KhovratovichEthereum FoundationVerified email at abdkconsulting.com