Get my own profile
Co-authors
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Gorka IrazoquiWorcester Polytechnic InstituteVerified email at wpi.edu
Mehmet Sinan İnciSecurity Researcher at IntelVerified email at intel.com
Amir MoradiRuhr University BochumVerified email at rub.de
Berk GulmezogluIowa State UniversityVerified email at iastate.edu
Daniel MoghimiUniversity of California San DiegoVerified email at ucsd.edu
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Francesco RegazzoniALaRI - USIVerified email at alari.ch
XIN YEFord Motor CompanyVerified email at ford.com
Ingo von MaurichNXP SemiconductorsVerified email at rub.de
Andrey BogdanovProfessor for Applied Cryptography at University of Bergen; CEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Aria ShahverdiUniversity of Maryland, College ParkVerified email at umd.edu
Rainer SteinwandtThe University of Alabama in HuntsvilleVerified email at uah.edu
Mostafa TahaAssistant Professor in the Systems and Computer Engineering Dept. of Carleton UniversityVerified email at sce.carleton.ca
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Sandeep S. KumarR&D Manager, Signify ResearchVerified email at signify.com
Andy RuppUniversity of LuxembourgVerified email at rub.de
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Christopher WolfRuhr-University Bochum, Horst Görtz Institute for IT-SecurityVerified email at christopher-wolf.de
Thomas Eisenbarth
Verified email at uni-luebeck.de - Homepage