Get my own profile
Public access
View all27 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Stefan KölblGoogleVerified email at mailbox.org
Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
Amir MoradiUniversity of Cologne, GermanyVerified email at uni-koeln.de
Yannick SeurinCryptography Expert, ANSSIVerified email at ssi.gouv.fr
Christof BeierleRuhr University BochumVerified email at rub.de
Gaëtan LeurentINRIAVerified email at inria.fr
Gregor LeanderRuhr University BochumVerified email at rub.de
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Willi MeierFHNWVerified email at fhnw.ch
Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Follow
Thomas Peyrin
Associate Professor, Nanyang Technological University
Verified email at ntu.edu.sg - Homepage