Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Gregor LeanderRuhr University BochumEmail verificata su rub.de
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Thomas PeyrinProfessor, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Christof BeierleRuhr University BochumEmail verificata su rub.de
- Jérémy JEANANSSIEmail verificata su ssi.gouv.fr
- Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenEmail verificata su box.cr.yp.to
- Amir MoradiTechnische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Joost RijneveldRadboud UniversityEmail verificata su cs.ru.nl
- Peter SchwabeMPI-SP and Radboud UniversityEmail verificata su mpi-sp.org
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyEmail verificata su tue.nl
- Tyge TiessenTechnical University of DenmarkEmail verificata su dtu.dk
- Maria EichlsederGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Christoph DobraunigIntel CorporationEmail verificata su intel.com
- Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsEmail verificata su tue.nl
- Lars Ramkilde KnudsenSDUEmail verificata su ramkildeknudsen.dk
- Yu SasakiNTT Secure Platform Labratories
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaEmail verificata su nxp.com