Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
- Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
- Guilherme PerinLeiden UniversityVerified email at tudelft.nl
- Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
- Bian YangNTNUVerified email at ntnu.no
- Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
- Yuval YaromRuhr University BochumVerified email at rub.de
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
- Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
- Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
- Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
- François KoeuneUCL Crypto GroupVerified email at uclouvain.be
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
- Sébastien DuvalUniversité de LorraineVerified email at loria.fr
- Servio PaguadaResearcher at IKERLANVerified email at ikerlan.es
- BJ BoomUniversity of Twente, University of EdinburghVerified email at imec.nl