Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Bian YangNTNUVerified email at ntnu.no
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Sébastien DuvalUniversité de VersaillesVerified email at uvsq.fr
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Yuval YaromRuhr University BochumVerified email at rub.de
BJ BoomUniversity of Twente, University of EdinburghVerified email at inf.ed.ac.uk
Koen SimoensVerified email at simi.be