Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Christof BeierleRuhr University BochumVerified email at rub.de
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Yu SasakiNTT Secure Platform Labratories
Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaVerified email at nxp.com