Get my own profile
Public access
View all45 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Qingju Wang (王庆菊)Postdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Kerem VarıcıMastercardVerified email at mastercard.com
Antoon BosselaersKU LeuvenVerified email at esat.kuleuven.be
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Tomer AshurCryptomeriaVerified email at cryptomeria.tech