Get my own profile
Public access
View all22 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Tomislav NadResearch assistantVerified email at tnad.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Professor (Deakin and SCU)/ A. Prof(UNSW))Verified email at tcs.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Dmitry KhovratovichEthereum FoundationVerified email at abdkconsulting.com