Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Gregor LeanderRuhr University BochumEmail verificata su rub.de
- Amir MoradiTechnische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Zahra AhmadianAssistant Professor, Shahid Beheshti UniversityEmail verificata su sbu.ac.ir
- Håvard RaddumSimula Research LaboratoryEmail verificata su simula.no
- Mahmoud SalmasizadehAssociate Professor Electronics Research Institute, Sharif University of TechnologyEmail verificata su sharif.ir
- Mohammad Reza ArefProfessor of Electrical Engineering, Sharif university of TechnologyEmail verificata su sharif.edu
- Aein Rezaei ShahmirzadiPQShield LtdEmail verificata su pqshield.com
- Thorben MoosUniversité catholique de Louvain (UCLouvain)Email verificata su uclouvain.be
- Christof BeierleRuhr University BochumEmail verificata su rub.de
- Maria EichlsederGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Friedrich WiemercryptosolutionsEmail verificata su mailbox.org
- Tobias SchneiderNXP Semiconductors, Gratkorn, AustriaEmail verificata su rub.de
- Falk SchellenbergMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Anita AghaieHorst Görtz Institut, Ruhr University BochumEmail verificata su rub.de
- Yosuke TodoNTT Social Informatics LaboratoriesEmail verificata su ntt.com
- Miroslav KnezevicNXP SemiconductorsEmail verificata su nxp.com
- Joan DaemenProfessor, Radboud UniversityEmail verificata su noekeon.org
- Christoph DobraunigIntel CorporationEmail verificata su intel.com
- Yanis BelkheyarPhD student in cryptography, Radboud University NetherlandEmail verificata su ru.nl
- Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USEmail verificata su intel.com