Get my own profile
Public access
View all29 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Vladimir RozicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
- Leibo LiuProf. of Institute of Microelectronics, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Shaojun WeiProfessor, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
- Josep BalaschKU LeuvenVerified email at kuleuven.be
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Eduard MarinSenior Research Scientist at Telefonica ResearchVerified email at telefonica.com
- Pieter MaeneKU Leuven/COSICVerified email at esat.kuleuven.be
- Jeroen DelvauxVerified email at tii.ae
- Ruan de ClercqKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
- Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
- Dong WangSchool of Computer Science and Information Technology, Beijing Jiaotong UniversityVerified email at bjtu.edu.cn
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Thomas De CnuddeVerified email at fabriccryptography.com