Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Svetla NikovaKU LeuvenVerified email at esat.kuleuven.be
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Qingju Wang (王庆菊)Postdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Antoon BosselaersKU LeuvenVerified email at esat.kuleuven.be
Kerem VarıcıPost Doc, UCL : Université catholique de LouvainVerified email at uclouvain.be
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org