Get my own profile
Public access
View all57 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
An BraekenVrije Universiteit BrusselVerified email at vub.be
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
Kazuo SakiyamaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Frederik VercauterenProfessor at Katholieke Universiteit LeuvenVerified email at esat.kuleuven.be
Sujoy Sinha RoyAssociate Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Verified email at uic.edu.cn
Berna OrsIstanbul Technical UniversityVerified email at itu.edu.tr
Diana GoehringerProfessor for Adaptive Dynamic Systems, TU DresdenVerified email at tu-dresden.de
Dirk KochSchool of Computer Science, University of ManchesterVerified email at recobus.de
Jan Genoeimec (SAT department) and KULeuven (ESAT department)Verified email at kuleuven.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Barış EgeRiscure B.V.Verified email at riscure.com
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be