Get my own profile
Public access
View all23 articles
1 article
available
not available
Based on funding mandates
Co-authors
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Lauren De MeyerRambus Cryptography ResearchVerified email at esat.kuleuven.be
Thomas De CnuddeZamaVerified email at zama.ai
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Qingju Wang (王庆菊)Postdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Atul LuykxGoogleVerified email at google.com
Nicky MouhaResearcher, NISTVerified email at nist.gov
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Victor Arribas AbrilRambus IncVerified email at rambus.com
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Nigel SmartKU LeuvenVerified email at kuleuven.be
George PetridesUniversity of CyprusVerified email at ucy.ac.cy