Get my own profile
Public access
View all27 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Bohan Yang (杨博翰)Tsinghua UniversityVerified email at tsinghua.edu.cn
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Milos GrujicKU Leuven, ESAT-COSICVerified email at esat.kuleuven.be
Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Roel MaesSynopsysVerified email at synopsys.com
Josep BalaschKU LeuvenVerified email at kuleuven.be
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Jeroen DelvauxVerified email at tii.ae
Erik van der SluisIntrinsic ID BVVerified email at intrinsic-id.com
Filip VeljkovicICEYEVerified email at iceye.fi
Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com