Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Tomislav NadResearch assistantVerified email at tnad.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Lars Ramkilde KnudsenDTUVerified email at ramkildeknudsen.dk
Svetla NikovaKU LeuvenVerified email at esat.kuleuven.be
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Dmitry KhovratovichEthereum Foundation and Dusk NetworkVerified email at abdkconsulting.com