Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Michael TunstallCryptography ResearchVerified email at cryptography.com
- Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
- Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
- Zooko Wilcox-O'HearnLeast AuthorityVerified email at zooko.com
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
- Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
- Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr