Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Barbara GigerlGraz University of TechnologyVerified email at iaik.tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Peter PesslInfineon TechnologiesVerified email at infineon.com
Thomas UnterluggauerResearch Scientist, Intel CorporationVerified email at intel.com
Roderick BloemGraz University of TechnologyVerified email at iaik.tugraz.at
Vedad HadžićPhD Candidate, TU GrazVerified email at iaik.tugraz.at
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechVerified email at chelpis.com
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Christine van VredendaalNXP SemiconductorsVerified email at nxp.com
Julius HermelinkMax Planck Institute for Security and Privacy (MPI-SP)Verified email at mpi-sp.org
Thomas SchambergerChair of Security in Information Technology, Technical University of MunichVerified email at tum.de
Rishub NagpalGraz University of TechnologyVerified email at iaik.tugraz.at
Marcel NagelerGraz University of TechnologyVerified email at iaik.tugraz.at
Sara ZareiSharif University of TechnologyVerified email at ee.sharif.ir