Get my own profile
Public access
View all100 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
- Atul LuykxGoogleVerified email at google.com
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Christoph DobraunigIntel CorporationVerified email at intel.com
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
- Nicky MouhaResearcher, NISTVerified email at nist.gov
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
- Samuel NevesUniversity of CoimbraVerified email at dei.uc.pt
- Robert PrimasIntel LabsVerified email at intel.com
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
- Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
- Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
- Tim BeyneCOSIC, KU LeuvenVerified email at kuleuven.be
Follow
Bart Mennink
Digital Security Group, Radboud University, Nijmegen
Verified email at cs.ru.nl - Homepage