Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Łukasz ChmielewskiAssistant Professor at Centre for Research on Cryptography and Security (CRoCS), Masaryk UniversityVerified email at fi.muni.cz
- Guilherme PerinLeiden UniversityVerified email at tudelft.nl
- Lichao WuTechnische Universität DarmstadtVerified email at tu-darmstadt.de
- Marina KrčekTU DelftVerified email at tudelft.nl
- Zhuoran LiuRadboud UniversityVerified email at cs.ru.nl
- Niels SamwelRadboud UniversityVerified email at cs.ru.nl
- Martha LarsonRadboud UniversityVerified email at ru.nl
- Yasuyuki NogamiOkayama universityVerified email at okayama-u.ac.jp