Crea il mio profilo
Accesso pubblico
Visualizza tutto51 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Joan DaemenProfessor, Radboud UniversityEmail verificata su noekeon.org
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Svetla Petkova-NikovaKU LeuvenEmail verificata su esat.kuleuven.be
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Lars Ramkilde KnudsenSDUEmail verificata su ramkildeknudsen.dk
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Paulo BarretoUniversity of Washington TacomaEmail verificata su uw.edu
- Begul BilginRambus Cryptography Research, the NetherlandsEmail verificata su rambus.com
- Martin SchläfferInfineon TechnologiesEmail verificata su infineon.com
- Mario LambergerSenior Principal Cryptography Architect, NXP Semiconductors AustriaEmail verificata su nxp.com
- Qingju Wang (王庆菊)Telecom Paris, Institut Polytechnique de ParisEmail verificata su telecom-paris.fr
- Benedikt GierlichsResearch Expert at KU Leuven/COSICEmail verificata su esat.kuleuven.be
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Andrey BogdanovCEO/Founder at CYBERCRYPTEmail verificata su cyber-crypt.com
- Antoon BosselaersKU LeuvenEmail verificata su esat.kuleuven.be
- Kerem VarıcıMastercardEmail verificata su mastercard.com
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Elmar TischhauserUniversity of MarburgEmail verificata su mathematik.uni-marburg.de
- Bohan Yang (杨博翰)Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk