Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Bian YangNTNUVerified email at ntnu.no
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Yuval YaromRuhr University BochumVerified email at rub.de
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Sébastien DuvalUniversité de LorraineVerified email at loria.fr
BJ BoomUniversity of Twente, University of EdinburghVerified email at imec.nl
Servio PaguadaResearcher at IKERLANVerified email at ikerlan.es