Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Christof BeierleRuhr University BochumVerified email at rub.de
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Amir MoradiRuhr University Bochum, GermanyVerified email at rub.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Lars Ramkilde KnudsenDTUVerified email at ramkildeknudsen.dk
Yu SasakiNTT Secure Platform Labratories
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com