Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
María Naya-PlasenciaINRIA ParisVerified email at inria.fr
Christina BouraIRIF, Université Paris CitéVerified email at irif.fr
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Caroline FontaineCNRS researcher, at LMF (Gif-sur-Yvette, France)Verified email at cnrs.fr
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Marine MinierProfessor at Université de Lorraine - LORIA LabVerified email at loria.fr
Olivier BilletEPO, Munich, GermanyVerified email at blackowl.org
Gohar M. KyureghyanUniversity of RostockVerified email at uni-rostock.de
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Benoit Chevallier-MamesZamaVerified email at zama.ai
Philippe GaboritProfessor in computer science, university of Limoges, FranceVerified email at unilim.fr
Seznec AndreINRIA/IRISAVerified email at inria.fr
Kapali ViswanathanSiemens TechnologyVerified email at siemens.com
Pascal JunodApplied CryptographerVerified email at junod.info
Faina Solov'evaSobolev Institute of MathematicsVerified email at math.nsc.ru