Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Peter SchwabeProfessor, Radboud University, Nijmegen, The NetherlandsVerified email at cs.ru.nl
Tanja LangeProfessor Cryptology, Technische Universiteit Eindhoven, the NetherlandsVerified email at tue.nl
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Zooko Wilcox-O'HearnLeast AuthorityVerified email at zooko.com
Andreas HülsingAssistant Professor, Eindhoven University of TechnologyVerified email at tue.nl
Michael TunstallCryptography ResearchVerified email at cryptography.com
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Louiza Papachristodoulou
Radboud University Nijmegen
Verified email at cryptologio.org