Get my own profile
Public access
View all68 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Stjepan PicekUniversity of Zagreb Faculty of Electrical Engineering and Computing & Radboud UniversityVerified email at fer.unizg.hr
An BraekenVrije Universiteit BrusselVerified email at vub.be
Bohan YangTsinghua UniversityVerified email at tsinghua.edu.cn
Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.beSujoy Sinha RoyAssociate Professor, TU GrazVerified email at tugraz.at
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Donglong ChenAssociate Professor, Beijing Normal-Hong Kong Baptist UniversityVerified email at bnbu.edu.cn
Berna OrsIstanbul Technical UniversityVerified email at itu.edu.tr
Dirk KochSchool of Computer Science, University of ManchesterVerified email at recobus.de
Diana GoehringerProfessor for Adaptive Dynamic Systems, TU DresdenVerified email at tu-dresden.de
Jan Genoeimec (LEAN expertise centre) and KULeuven (ESAT department)Verified email at kuleuven.be
Dave SingeleeKatholieke Universiteit LeuvenVerified email at kuleuven.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Barış EgeRiscure B.V.Verified email at riscure.com