Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Stefan KölblGoogleVerified email at mailbox.org
Tobias SchneiderNXP Semiconductors, Gratkorn, AustriaVerified email at rub.de
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Pedro Maat C. MassolinoPQShield Ltd.Verified email at pqshield.com
Kashif NawazOak Ridge National LaboratoryVerified email at ornl.gov
Rotella YannUniversité Paris-Saclay, Laboratoire de Mathématiques de Versailles, UVSQVerified email at uvsq.fr
Tomer Ashur3MI LabsVerified email at 3milabs.tech
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Gaëtan LeurentINRIAVerified email at inria.fr
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Fabio CamposufpeVerified email at ieee.org