Get my own profile
Public access
View all31 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jérémy JEANANSSIVerified email at ssi.gouv.fr
- Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
- Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Axel Y. PoschmannVP of ProductVerified email at pqshield.com
- Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Stefan KölblGoogleVerified email at mailbox.org
- Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
- Pascal SasdrichChair for Security Engineering, Ruhr-Universität Bochum, GermanyVerified email at rub.de
- Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Gaëtan LeurentINRIAVerified email at inria.fr
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Christof BeierleRuhr University BochumVerified email at rub.de
- Gregor LeanderRuhr University BochumVerified email at rub.de
- María Naya-PlasenciaINRIA ParisVerified email at inria.fr
- Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
- Martin SchläfferInfineon TechnologiesVerified email at infineon.com
- Marc StevensScientific Researcher, Centrum Wiskunde & InformaticaVerified email at marc-stevens.nl
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Follow