Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Gregor LeanderRuhr University BochumVerified email at rub.de
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Henri GilbertANSSIVerified email at ssi.gouv.frJacques Patarinprofesseur UVSQVerified email at club-internet.fr
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
John SteinbergerTsinghua University, BeijingVerified email at tsinghua.edu.cnTim RuffingVerified email at real-or-random.org
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Georg FuchsbauerTU WienVerified email at ist.ac.at
Jean DalibardCollège de France and Laboratoire Kastler BrosselVerified email at college-de-france.fr
Jérémy JEANANSSIVerified email at ssi.gouv.frGregory MaxwellIndependant Researcher [Retired]Verified email at xiph.org
Gilles Macario-RatVerified email at orange.comIvica NikolićNational University of SingaporeVerified email at nus.edu.sg
Shan ChenAssistant Professor, Southern University of Science and Technology (SUSTech)Verified email at sustech.edu.cn