Get my own profile
Public access
View all35 articles
1 article
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Gaëtan LeurentINRIAVerified email at inria.fr
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Stefan KölblGoogleVerified email at mailbox.org
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Daniel KalesTACEO GmbHVerified email at taceo.io
Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org