Get my own profile
Co-authors
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Nicolas Veyrat-CharvillonVerified email at ubisoft.com
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Francesco RegazzoniALaRI - USIVerified email at alari.ch
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Michael HutterCryptography Research Inc, RambusVerified email at cryptography.com
Antoine JouxCISPAVerified email at cispa.saarland
Mathieu RenauldPhD in Cryptology, Université catholique de Louvain (UCL)Verified email at uclouvain.be
Christophe PetitUniversité libre de Bruxelles - University of Birmingham - University of OxfordVerified email at ulb.be
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Johann HeyszlHead of Hardware Security Department, Fraunhofer AISECVerified email at aisec.fraunhofer.de
Daniel HeinGraz Universitz of TechnologyVerified email at iaik.tugraz.at
Marcin WójcikVerified email at cam.ac.uk
