Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nlPieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Jeroen BreebaartDolby LaboratoriesVerified email at dolby.comStjepan PicekUniversity of Zagreb Faculty of Electrical Engineering and Computing & Radboud UniversityVerified email at fer.unizg.hr
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Asmita AdhikaryPhD Candidate, Radboud UniversityVerified email at ru.nl
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Yuval YaromRuhr University BochumVerified email at rub.de
Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Bian YangNTNUVerified email at ntnu.no
Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.ukChristophe GiraudCryptography and Product Security Group Manager at IDEMIA Secure TransactionsVerified email at idemia.com
Davide BelliziaSenior Secure ASIC/FPGA Designer | Researcher @ Telsy S.p.A.Verified email at telsy.it
François KoeuneUCL Crypto GroupVerified email at uclouvain.beFrancois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor (UCLouvain)Verified email at uclouvain.be
Sébastien DuvalUniversité de LorraineVerified email at loria.fr