Get my own profile
Public access
View all40 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Martijn StamSenior Researcher at Simula UiB, NorwayVerified email at simula.no
Luke MatherResearcher in Applied Cryptography, University of BristolVerified email at bristol.ac.uk
Daniel P. MartinSenior Data Scientist, The Alan Turing InstituteVerified email at turing.ac.uk
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Michael TunstallCryptography ResearchVerified email at cryptography.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Berna OrsIstanbul Technical UniversityVerified email at itu.edu.tr
Manfred AignerYagoba GmbHVerified email at yagoba.com
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Marcel MedwedNXP SemiconductorsVerified email at nxp.com
Marcin WójcikVerified email at cam.ac.uk
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Andrew MossLektor in Computer Science, Blekinge Institute of TechnologyVerified email at bth.se
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Follow
Elisabeth Oswald
Professor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of Birmingham
Verified email at aau.at