Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Mario WernerNXP SemiconductorsVerified email at nxp.com
Fangfei LiuIntel CorporationVerified email at intel.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Robert PrimasIntel LabsVerified email at intel.com
Robert SchillingRivos Inc.Verified email at rivosinc.com
Erich WengerInfineon TechnologiesVerified email at infineon.com
Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Raphael SpreitzerSGSVerified email at sgs.com
Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
Josep TorrellasProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Christopher W. FletcherUniversity of California, BerkeleyVerified email at berkeley.edu
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Luca BeniniETH Zürich, Università di BolognaVerified email at unibo.it
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Follow