Get my own profile
Public access
View all36 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Yuri BorissovInstitute of Mathematics and Informatics, Bulgarian Academy of SciencesVerified email at math.bas.bg
Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
Luan IbraimiRoyal Dutch ShellVerified email at shell.com
Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
Yee Wei LawSenior Lecturer, University of South AustraliaVerified email at unisa.edu.au
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Emilia KasperSoftware engineer, GoogleVerified email at google.com
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
Roel PeetersnextAuthVerified email at nextauth.com
Jeroen SchillewaertUniversity of AucklandVerified email at auckland.ac.nz
Joris ClaessensMicrosoft & KU Leuven