Get my own profile
Public access
View all56 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
An BraekenVrije Universiteit BrusselVerified email at vub.be
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Sujoy Sinha RoyAssistant Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Berna OrsIstanbul Technical UniversityVerified email at itu.edu.tr
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Jan Genoeimec (SAT department) and KULeuven (ESAT department)Verified email at kuleuven.be
Diana GoehringerProfessor for Adaptive Dynamic Systems, TU DresdenVerified email at tu-dresden.de
Dirk KochSchool of Computer Science, University of ManchesterVerified email at recobus.de
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de