Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Lauren De MeyerRambus Cryptography ResearchVerified email at esat.kuleuven.be
- Thomas De CnuddeVerified email at fabriccryptography.com
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
- Atul LuykxGoogleVerified email at google.com
- Nicky MouhaResearcher, NISTVerified email at nist.gov
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
- Victor Arribas AbrilRambus IncVerified email at rambus.com
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
- Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- George PetridesUniversity of CyprusVerified email at ucy.ac.cy