Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
Richard PetriMPI-SPVerified email at rpls.de
Clemens HlauschekRISE - Research Industrial Systems Engineering GmbHVerified email at hlauschek.com
Hülya EvkanResearcher, Fraunhofer SIT & PhD Candidate, Radboud UniversityVerified email at ru.nl
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Qian GuoLund UniversityVerified email at eit.lth.se
Alexander NilssonPhD Researcher in Cryptography, Lund UniversityVerified email at eit.lth.se
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Sebastian PaulRobert Bosch GmbHVerified email at de.bosch.com
Yulia KuzovkovaPQShieldVerified email at pqshield.com
Tung ChouAcademia SinicaVerified email at crypto.tw
Po-Jen ChenNational Taiwan UniversityVerified email at ntu.edu.tw
Jakub SzeferAssociate Professor of Electrical Engineering, Yale UniversityVerified email at yale.edu
Wen WangIntel LabsVerified email at intel.com
Sanjay DeshpandeYale UniversityVerified email at yale.edu
Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
Nicolai KuntzeUniversity of Applied Sciences MainzVerified email at hs-mainz.de
Daniel ZelleFraunhofer SITVerified email at sit.fraunhofer.de
Christoph KraußDarmstadt University of Applied SciencesVerified email at h-da.de
Follow
Norman Lahr
Other namesNorman Göttert
Max Planck Institute for Security and Privacy
Verified email at lahr.email