Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Ruan de ClercqKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Tilo MüllerFaculty Computer Science, Hof University of Applied SciencesVerified email at hof-university.de
Felix FreilingFriedrich-Alexander-Universität Erlangen-Nürnberg (FAU)Verified email at fau.de
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumVerified email at ulb.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Eduard MarinSenior Research Scientist at Telefonica ResearchVerified email at telefonica.com
Tomer Ashur3MI LabsVerified email at 3milabs.tech
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Jeroen DelvauxVerified email at tii.ae
Vladimir RozicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Jens HermansCOSIC, KU LeuvenVerified email at esat.kuleuven.be
Roel PeetersnextAuthVerified email at nextauth.com
Furkan Turanimec-COSIC, KU LeuvenVerified email at esat.kuleuven.be
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn