Get my own profile
Public access
View all90 articles
1 article
available
not available
Based on funding mandates
Co-authors
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Atul LuykxGoogleVerified email at google.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Nicky MouhaResearcher, NISTVerified email at nist.gov
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Samuel NevesUniversity of CoimbraVerified email at dei.uc.pt
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Follow
Bart Mennink
Digital Security Group, Radboud University, Nijmegen
Verified email at cs.ru.nl - Homepage