Get my own profile
Public access
View all30 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Leibo LiuProf. of Institute of Microelectronics, Tsinghua UniversityVerified email at tsinghua.edu.cn
Vladimir RozicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Shaojun WeiProfessor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Josep BalaschKU LeuvenVerified email at kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Eduard MarinSenior Research Scientist at Telefonica ResearchVerified email at telefonica.com
Pieter MaeneKU Leuven/COSICVerified email at esat.kuleuven.be
Jeroen DelvauxVerified email at tii.ae
Ruan de ClercqKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Dong WangSchool of Computer Science and Information Technology, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Thomas De CnuddeVerified email at fabriccryptography.com