Crea il mio profilo
Accesso pubblico
Visualizza tutto36 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Vincent RijmenUniversity of Leuven (KU Leuven)Email verificata su esat.kuleuven.be
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Begul BilginRambus Cryptography Research, the NetherlandsEmail verificata su rambus.com
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
- Yuri BorissovInstitute of Mathematics and Informatics, Bulgarian Academy of SciencesEmail verificata su math.bas.bg
- Benedikt GierlichsResearch Expert at KU Leuven/COSICEmail verificata su esat.kuleuven.be
- Zheng GongProfessor of Computer Science, South China Normal UniversityEmail verificata su scnu.edu.cn
- Luan IbraimiRoyal Dutch ShellEmail verificata su shell.com
- Martin SchläfferInfineon TechnologiesEmail verificata su infineon.com
- Joos VandewalleProfessor at Electrical Engineering Dept (ESAT-Stadius) KULeuvenEmail verificata su esat.kuleuven.be
- Yee Wei LawSenior Lecturer, University of South AustraliaEmail verificata su unisa.edu.au
- Emilia KasperSoftware engineer, GoogleEmail verificata su google.com
- Elmar TischhauserUniversity of MarburgEmail verificata su mathematik.uni-marburg.de
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Joan DaemenProfessor, Radboud UniversityEmail verificata su noekeon.org
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelEmail verificata su cs.haifa.ac.il
- Paulo BarretoUniversity of Washington TacomaEmail verificata su uw.edu
- Roel PeetersnextAuthEmail verificata su nextauth.com
- Jeroen SchillewaertUniversity of AucklandEmail verificata su auckland.ac.nz
- Thomas JohanssonDept of EIT, Lund University, SwedenEmail verificata su eit.lth.se