Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Vincent HwangMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Ko StoffelenRadboud UniversityVerified email at cs.ru.nl
Amber SprenkelsRadboud UniversityVerified email at electricdusk.com
Ming-Shing ChenAcademia SiniceVerified email at crypto.tw
Amin AbdulrahmanPhD Student, Max Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Cheng-Jhih ShihNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Fabio CamposPostdoc at University of Applied Sciences WiesbadenVerified email at sopmac.de
Juliane KrämerProfessor, University of RegensburgVerified email at ur.de
Chi-Ming ChungNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Gregor SeilerIBM Research EuropeVerified email at posteo.net
Thom WiggersSenior Cryptography Researcher, PQShieldVerified email at thomwiggers.nl
Albrecht PetzoldtFAU Erlangen NurembergVerified email at cs.fau.de
Marc StöttingerRheinMain University of Applied SciencesVerified email at hs-rm.de
Ward BeullensResearcher at IBM Research ZurichVerified email at zurich.ibm.com
Peter PesslInfineon TechnologiesVerified email at infineon.com
Robert PrimasIntel LabsVerified email at intel.com
Daniel HeinzInfineon Technologies AGVerified email at infineon.com