Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Bian YangNTNUVerified email at ntnu.no
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Yuval YaromRuhr University BochumVerified email at rub.de
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
Christophe GiraudCryptography and Product Security Group Manager at IDEMIA Secure TransactionsVerified email at idemia.com
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Sébastien DuvalUniversité de LorraineVerified email at loria.fr
Servio PaguadaResearcher at IKERLANVerified email at ikerlan.es
BJ BoomUniversity of Twente, University of EdinburghVerified email at imec.nl