Get my own profile
Public access
View all54 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Josep BalaschKU LeuvenVerified email at kuleuven.be
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
- Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
- Arthur BeckersKU LeuvenVerified email at esat.kuleuven.be
- Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
- Begul BilginRambus Cryptography Research, the NetherlandsVerified email at rambus.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Lennert WoutersCOSIC, KU LeuvenVerified email at esat.kuleuven.be
- Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
- Elisabeth OswaldUniversity of Birmingham and University of KlagenfurtVerified email at bham.ac.uk
- Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenVerified email at esat.kuleuven.be
- Sebastian FaustTU DarmstadtVerified email at cs.tu-darmstadt.de
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com
- Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com