Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Tim GüneysuSecurity Engineering, Ruhr-Universität BochumVerified email at rub.de
Markus KrauszRuhr-University BochumVerified email at rub.deGregor LeanderRuhr University BochumVerified email at rub.de
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Rei UenoKyoto UniversityVerified email at kyoto-u.ac.jp
Moritz PetersRuhr-Universität BochumVerified email at rub.de
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.toNils PohlRuhr-Universität Bochum, Fraunhofer FHRVerified email at rub.de
Ming-Shing ChenAcademia SiniceVerified email at crypto.twPascal SasdrichRuhr-Universität Bochum, GermanyVerified email at rub.de
Pascal CotretAssociate professorVerified email at ensta.fr
Vianney LapotreAssociate professor / Lab-STICCVerified email at univ-ubs.fr
Guy GOGNIATProfessor, Université Bretagne SudVerified email at univ-ubs.fr
Nicolas GaudinPhD in Secure Processor ArchitectureVerified email at univ-ubs.fr
Felix StaudiglRWTH Aachen UniversityVerified email at ice.rwth-aachen.deFabian SchwarzNVIDIAVerified email at nvidia.com
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Georg LandIntelVerified email at intel.com
Yuval YaromRuhr University BochumVerified email at rub.de