Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Professor (Deakin and SCU)/ A. Prof(UNSW))Verified email at tcs.com
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Xuejia LaiProfessor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Chanathip NamprempreAssociate Professor, Reed CollegeVerified email at reed.edu
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Nasour BagheriProfessor of Electrical Engineering, Shahid Rajaee UniversityVerified email at sru.ac.ir
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu