Get my own profile
Public access
View all36 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Yuri BorissovInstitute of Mathematics and Informatics, Bulgarian Academy of SciencesVerified email at math.bas.bg
- Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
- Luan IbraimiRoyal Dutch ShellVerified email at shell.com
- Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
- Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Emilia KasperSoftware engineer, GoogleVerified email at google.com
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
- Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
- Roel PeetersnextAuthVerified email at nextauth.com
- Jeroen SchillewaertUniversity of AucklandVerified email at auckland.ac.nz
- Joris ClaessensMicrosoft & KU Leuven