Get my own profile
Public access
View all22 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Amir MoradiTechnische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Tim GüneysuSecurity Engineering, Ruhr-Universität BochumVerified email at rub.de
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor (UCLouvain)Verified email at uclouvain.be
Joost RenesNXP SemiconductorsVerified email at nxp.com
Christine van VredendaalNXP SemiconductorsVerified email at nxp.comOlivier BronchainNXP Semiconductors, BelgiumVerified email at nxp.com
Yulia KuzovkovaPQShieldVerified email at pqshield.comJoppe W. BosCryptographic Researcher, NXP Semiconductors, Leuven, BelgiumVerified email at nxp.com
Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.deClément HoffmannNTT Social LaboratoriesVerified email at ntt.com
Gaëtan CassiersPostdoc, UCLouvainVerified email at uclouvain.be
Marcel MedwedNXP SemiconductorsVerified email at nxp.comMohamed ElGhamrawyUniversity of LübeckVerified email at uni-luebeck.de
Marc GourjonVerified email at mpi-sp.orgVincent GrossoCNRS/ Université Jean Monnet, Laboratoire Hubert Curien, FranceVerified email at univ-st-etienne.fr
Gregor LeanderRuhr University BochumVerified email at rub.de
Bastian RichterHorst Görtz Institute, Ruhr University BochumVerified email at rub.deThorben MoosUniversité catholique de Louvain (UCLouvain)Verified email at uclouvain.be
Anita AghaieHorst Görtz Institut, Ruhr University BochumVerified email at rub.de
Falk SchellenbergMax Planck Institute for Security and Privacy, BochumVerified email at rub.de