Get my own profile
Public access
View all49 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
- Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Antoon BosselaersKU LeuvenVerified email at esat.kuleuven.be
- Kerem VarıcıMastercardVerified email at mastercard.com
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk