Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Yuri BorissovInstitute of Mathematics and Informatics, Bulgarian Academy of SciencesVerified email at math.bas.bg
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Roel PeetersnextAuthVerified email at nextauth.com
Jeroen SchillewaertUniversity of AucklandVerified email at auckland.ac.nz
Joris ClaessensMicrosoft & KU Leuven