Get my own profile
Public access
View all70 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Moritz LippVerified email at mlq.me
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Raphael SpreitzerSGSVerified email at sgs.com
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Manfred AignerYagoba GmbHVerified email at yagoba.com
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Peter PesslInfineon TechnologiesVerified email at infineon.com
Marcel MedwedNXP SemiconductorsVerified email at nxp.com
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Johann HeyszlGoogle | OpenTitanVerified email at google.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Michael HutterPQShield LtdVerified email at pqshield.com