Get my own profile
Public access
View all76 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Clémentine MauriceCNRSVerified email at cnrs.fr
- Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
- Raphael SpreitzerSGSVerified email at sgs.com
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
- Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Manfred AignerYagoba GmbHVerified email at yagoba.com
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- Peter PesslInfineon TechnologiesVerified email at infineon.com
- Marcel MedwedNXP SemiconductorsVerified email at nxp.com
- Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
- Johann HeyszlGoogle | OpenTitanVerified email at google.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Michael HutterPQShield LtdVerified email at pqshield.com