Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Matthew RobshawTechnical Fellow, Impinj Inc.Email verificata su impinj.com
- Vincent RijmenUniversity of Leuven (KU Leuven)Email verificata su esat.kuleuven.be
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWEmail verificata su tcs.com
- Axel Y. PoschmannVP of ProductEmail verificata su pqshield.com
- Andrey BogdanovCEO/Founder at CYBERCRYPTEmail verificata su cyber-crypt.com
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Yannick SeurinCryptographer at LedgerEmail verificata su ledger.com
- Anne CanteautInria Paris-Rocquencourt, FranceEmail verificata su inria.fr
- David WagnerProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Martin SchläfferInfineon TechnologiesEmail verificata su infineon.com
- Xuejia LaiProfessor, Shanghai Jiao Tong UniversityEmail verificata su cs.sjtu.edu.cn
- Chanathip NamprempreAssociate Professor, Reed CollegeEmail verificata su reed.edu
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Nasour BagheriProfessor of Electrical Engineering, Shahid Rajaee UniversityEmail verificata su sru.ac.ir
- Alex BiryukovFull Professor of Computer Science, University of LuxembourgEmail verificata su uni.lu