Get my own profile
Public access
View all44 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Robert PrimasIntel LabsVerified email at intel.com
- Tim BeyneCOSIC, KU LeuvenVerified email at kuleuven.be
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
- Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
- Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
- Bas WesterbaanResearch Engineer, CloudflareVerified email at cloudflare.com
- Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
- Stefan KölblGoogleVerified email at mailbox.org
- Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
- Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
- Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
- Gregor LeanderRuhr University BochumVerified email at rub.de
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org