Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Svetla Petkova-NikovaKU LeuvenVerified email at esat.kuleuven.be
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Lauren De MeyerRambus Cryptography ResearchVerified email at esat.kuleuven.be
Thomas De CnuddeVerified email at fabriccryptography.com
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Qingju WangTelecom Paris, Institut Polytechnique de ParisVerified email at telecom-paris.fr
Atul LuykxGoogleVerified email at google.com
Nicky MouhaResearcher, NISTVerified email at nist.gov
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Victor Arribas AbrilRambus IncVerified email at rambus.com
Joan DaemenProfessor, Radboud UniversityVerified email at noekeon.org
Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
Nigel SmartKU LeuvenVerified email at kuleuven.be
George PetridesUniversity of CyprusVerified email at ucy.ac.cy