Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Stefan KölblGoogleVerified email at mailbox.org
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Christof BeierleRuhr University BochumVerified email at rub.de
Gaëtan LeurentINRIAVerified email at inria.fr
Gregor LeanderRuhr University BochumVerified email at rub.de
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Marc StevensScientific Researcher, Centrum Wiskunde & InformaticaVerified email at marc-stevens.nl
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Follow