Get my own profile
Public access
View all51 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Martin SchläfferInfineon TechnologiesVerified email at infineon.com
Christoph DobraunigLamarr Security ResearchVerified email at lamarr.at
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Tomislav NadResearch assistantVerified email at tnad.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Praveen GauravaramSenior Scientist, Tata Consultancy Services; Adjunct Associate Professor, UNSWVerified email at tcs.com
Mario LambergerPrincipal Cryptographer and Security Assessment Expert, NXP Semiconductors AustriaVerified email at nxp.com
Stefan KölblGoogleVerified email at mailbox.org
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Qingju Wang (王庆菊)Postdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Elena AndreevaTechnical University of ViennaVerified email at tuwien.ac.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Nicky MouhaResearcher, NISTVerified email at nist.gov
Begul BilginRambus Cryptography Research, the Netherlands and imec-COSIC, KU Leuven, BelgiumVerified email at esat.kuleuven.be
Florian Mendel
Cryptographer & Security Architect - Infineon Technologies
Verified email at infineon.com - Homepage