Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Bohan Yang (杨博翰)Postdoctoral researcher at Tsinghua UniversityVerified email at tsinghua.edu.cn
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Roel MaesIntrinsic IDVerified email at intrinsic-id.com
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Josep BalaschKU LeuvenVerified email at kuleuven.be
Erik van der SluisIntrinsic ID BVVerified email at intrinsic-id.com
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Jeroen DelvauxVerified email at tii.ae
Filip VeljkovicThales Alenia Space in SpainVerified email at thalesaleniaspace.com
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl