Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Sye-Loong KeohSchool of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
René HummenRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Klaus WehrleProfessor at RWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl