Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Maria EichlsederGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Christoph DobraunigIntel CorporationEmail verificata su intel.com
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Vincent RijmenUniversity of Leuven (KU Leuven)Email verificata su esat.kuleuven.be
- Krystian MatusiewiczSecurity Researcher at IntelEmail verificata su intel.com
- Tomislav NadResearch assistantEmail verificata su tnad.at
- Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWEmail verificata su tcs.com
- Lars Ramkilde KnudsenSDUEmail verificata su ramkildeknudsen.dk
- Svetla Petkova-NikovaKU LeuvenEmail verificata su esat.kuleuven.be
- María Naya-PlasenciaINRIA ParisEmail verificata su inria.fr
- Thomas PeyrinProfessor, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaEmail verificata su nxp.com
- Jean-Philippe AumassonKudelski SecurityEmail verificata su kudelskisecurity.com
- Kazumaro AokiBunkyo UniversityEmail verificata su bunkyo.ac.jp
- Ivica NikolićNational University of SingaporeEmail verificata su nus.edu.sg
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Emilia KasperSoftware engineer, GoogleEmail verificata su google.com
- Dmitry KhovratovichEthereum FoundationEmail verificata su abdkconsulting.com