Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Giorgio Di NataleCNRS - TIMAVerified email at univ-grenoble-alpes.fr
Jean Da RoltIFRSVerified email at bento.ifrs.edu.br
Marie-Lise FlottesLIRMMVerified email at lirmm.fr
Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
Barış EgeRiscure B.V.Verified email at riscure.com
Keshab K. ParhiUniversity of Minnesota, Erwin A. Kelen Chair in Electrical EngineeringVerified email at umn.edu
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
Sophie DupuisLIRMM (Université de Montpellier, CNRS)Verified email at lirmm.fr
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Tolga YalcinQualcomm, San DiegoVerified email at qti.qualcomm.com
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at uni-passau.de
S AftabjahaniIntel CorporationVerified email at intel.com
Selçuk KöseProfessor of Electrical and Computer Engineering, University of RochesterVerified email at rochester.edu
Ulya R. KarpuzcuElectrical and Computer Engineering, University of Minnesota, Twin-CitiesVerified email at umn.edu
Longfei WangQualcomm Technologies Inc.Verified email at qti.qualcomm.com
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Leif UhsadelKU Leuven (COSIC), Belgium and NTU (PACE), SingaporeVerified email at esat.kuleuven.be