Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Michael TunstallCryptography ResearchVerified email at cryptography.com
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Zooko Wilcox-O'HearnLeast AuthorityVerified email at zooko.com
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr