Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Håvard RaddumSimula Research LaboratoryVerified email at simula.no
Aein Rezaei ShahmirzadiPQShield LtdVerified email at pqshield.com
Mohammad Reza ArefProfessor of Electrical Engineering, Sharif university of TechnologyVerified email at sharif.edu
Zahra AhmadianAssistant Professor, Shahid Beheshti UniversityVerified email at sbu.ac.ir
Mahmoud SalmasizadehAssociate Professor Electronics Research Institute, Sharif University of TechnologyVerified email at sharif.ir
Thorben MoosUniversité catholique de Louvain (UCLouvain)Verified email at uclouvain.be
Christof BeierleRuhr University BochumVerified email at rub.de
Yanis BelkheyarPhD student in cryptography, Radboud University NetherlandVerified email at ru.nl
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Tobias SchneiderNXP Semiconductors, Gratkorn, AustriaVerified email at rub.de
Falk SchellenbergMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Anita AghaieHorst Görtz Institut, Ruhr University BochumVerified email at rub.de
Christoph DobraunigIntel CorporationVerified email at intel.com
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com