Get my own profile
Public access
View all41 articles
0 articles*
available
not available
Based on funding mandates
Co-authors
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Joost RijneveldRadboud UniversityVerified email at cs.ru.nl
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Stefan KölblGoogleVerified email at mailbox.org
Lorenzo GrassiPostDoc, Radboud University, Nijmegen (the Netherlands)Verified email at science.ru.nl
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Tim BeyneCOSIC, KU LeuvenVerified email at kuleuven.be
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Yu Long ChenCOSIC-ESAT, KU LeuvenVerified email at kuleuven.be
Markus SchofneggerHorizen LabsVerified email at alumni.tugraz.at
Gregor LeanderRuhr University BochumVerified email at rub.de
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de