Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Erik van der SluisIntrinsic ID BVVerified email at intrinsic-id.com
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Frans WillemsTechnische Universiteit EindhovenVerified email at tue.nl
Sandeep S. KumarR&D Manager, Signify ResearchVerified email at signify.com
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Georgios SelimisSecurity Architect - Axelera.aiVerified email at axelera.ai
Anthony Van HerrewegeKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Christian WachsmannIntel Germany GmbH & Co. KGVerified email at intel.com
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Said HamdiouiDelft University of TechnologyVerified email at tudelft.nl
Vladimir RozicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Tanya IgnatenkoEindhoven University of TechnologyVerified email at tue.nl
Mafalda Cortez, Ph.D.Principal Security Analyst @ Riscure B.V.Verified email at riscure.com
Dries SchellekensCOSIC, KU Leuven, SeptentrioVerified email at esat.kuleuven.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Roel PeetersnextAuthVerified email at nextauth.com
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Sanu MathewIntel CorporationVerified email at intel.com
Marcin WójcikVerified email at cam.ac.uk