Get my own profile
Public access
View all44 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
Christof BeierleRuhr University BochumVerified email at rub.de
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Amir MoradiUniversity of Cologne, GermanyVerified email at uni-koeln.de
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Friedrich WiemercryptosolutionsVerified email at mailbox.org
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Yannick SeurinCryptography Expert, ANSSIVerified email at ssi.gouv.fr
Stefan KölblGoogleVerified email at mailbox.org
Tolga YalcinGoogle, San DiegoVerified email at google.com
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at rub.de
Lilya BudaghyanProfessor of Informatics, University of BergenVerified email at uib.no
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr