Get my own profile
Public access
View all83 articles
1 article
available
not available
Based on funding mandates
Co-authors
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Atul LuykxGoogleVerified email at google.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Christoph DobraunigIntel CorporationVerified email at intel.com
Nicky MouhaResearcher, NISTVerified email at nist.gov
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Samuel NevesUniversity of CoimbraVerified email at dei.uc.pt
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Follow
Bart Mennink
Digital Security Group, Radboud University, Nijmegen
Verified email at cs.ru.nl - Homepage