Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Serge FehrCWIVerified email at cwi.nl
- Thijs VeugenTNO and University of TwenteVerified email at tno.nl
- Thomas AttemaResearcher, TNOVerified email at tno.nl
- Gilles ZémorProfessor of Mathematics, Bordeaux University and Institut universitaire de FranceVerified email at math.u-bordeaux.fr
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
- Peter SlootUniversity of Amsterdam and NTU SingaporeVerified email at uva.nl
- Emiliano ManciniHasselt UniversityVerified email at uhasselt.be
- Thomas RooijakkersTNOVerified email at tno.nl
- Wessel KraaijProfessor Leiden University; principal scientist TNO; ACM distinguished memberVerified email at liacs.leidenuniv.nl
- Supriyo ChatterjeaGroup Lead, Image Processing and Machine Learning, ASMLVerified email at asml.com
- Daniël WormSenior Consultant, TNOVerified email at tno.nl
- Michiel MarcusScientist, TNOVerified email at tno.nl
- Nicole GervasoniSecurity Researcher, TIIVerified email at tii.ae
Follow
Gabriele Spini
Scientist in Cryptography, AIT Austrian Institute of Technology
Verified email at ait.ac.at