Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Xuejia LaiProfessor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Chanathip NamprempreAssociate Professor, Reed CollegeVerified email at reed.edu
Nasour BagheriProfessor of Electrical Engineering, Shahid Rajaee UniversityVerified email at sru.ac.ir
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu