Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Robert PrimasIntel LabsVerified email at intel.com
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
- Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
- Hosein HadipourGraz University of TechnologyVerified email at iaik.tugraz.at
- Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
- Friedrich WiemercryptosolutionsVerified email at mailbox.org
- Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
- Gaëtan LeurentINRIAVerified email at inria.fr
- Stefan KölblGoogleVerified email at mailbox.org
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Daniel KalesTACEO GmbHVerified email at taceo.io