Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainEmail verificata su uclouvain.be
- Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyEmail verificata su iaik.tugraz.at
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Nicolas Veyrat-CharvillonUbisoft AnnecyEmail verificata su ubisoft.com
- Johann GroßschädlResearch Specialist, University of LuxembourgEmail verificata su uni.lu
- Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaEmail verificata su alari.ch
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumEmail verificata su uclouvain.be
- Benedikt GierlichsResearch Expert at KU Leuven/COSICEmail verificata su esat.kuleuven.be
- Michael HutterPQShield LtdEmail verificata su pqshield.com
- Mathieu RenauldPhD in Cryptology, Université catholique de Louvain (UCL)Email verificata su uclouvain.be
- Antoine JouxCISPAEmail verificata su cispa.saarland
- Christophe PetitUniversité libre de Bruxelles - University of BirminghamEmail verificata su ulb.be
- Sonia BelaïdCryptoExpertsEmail verificata su cryptoexperts.com
- Johann HeyszlGoogle | OpenTitanEmail verificata su google.com
- Daniel HeinGraz Universitz of TechnologyEmail verificata su iaik.tugraz.at
- Marcin WójcikEmail verificata su cam.ac.uk