Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Tomislav NadResearch assistantVerified email at tnad.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Professor (Deakin and SCU)/ A. Prof(UNSW))Verified email at tcs.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Dmitry KhovratovichEthereum FoundationVerified email at abdkconsulting.com
Emilia KasperSoftware engineer, GoogleVerified email at google.com