Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Christof BeierleRuhr University BochumVerified email at rub.de
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Amir MoradiRuhr University Bochum, GermanyVerified email at rub.de
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Tyge TiessenTechnical University of DenmarkVerified email at dtu.dk
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Yu SasakiNTT Secure Platform Labratories
Mario LambergerSenior Principal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com