Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ruben NiederhagenAssistant Research Fellow, Academia Sinica; Assistant Professor, University of Southern DenmarkVerified email at polycephaly.org
- Richard PetriVerified email at rpls.de
- Robin Leander SchröderVerified email at inso.tuwien.ac.at
- Clemens HlauschekRISE - Research Industrial Systems Engineering GmbHVerified email at hlauschek.com
- Hülya EvkanResearcher, Fraunhofer SIT & PhD Candidate, Radboud UniversityVerified email at ru.nl
- Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
- Qian GuoLund UniversityVerified email at eit.lth.se
- Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
- Alexander NilssonPhD Researcher in Cryptography, Lund UniversityVerified email at eit.lth.se
- Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
- Sebastian PaulRobert Bosch GmbHVerified email at de.bosch.com
- Yulia KuzovkovaNXP SemiconductorsVerified email at nxp.com
- Tung ChouAcademia SinicaVerified email at crypto.tw
- Po-Jen ChenNational Taiwan UniversityVerified email at ntu.edu.tw
- Jakub SzeferAssociate Professor of Electrical Engineering, Yale UniversityVerified email at yale.edu
- Wen WangIntel LabsVerified email at intel.com
- Sanjay DeshpandeYale UniversityVerified email at yale.edu
- Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
- Nicolai KuntzeUniversity of Applied Sciences MainzVerified email at hs-mainz.de
- Daniel ZelleFraunhofer SITVerified email at sit.fraunhofer.de
Follow
Norman Lahr
Other namesNorman Göttert
Max Planck Institute for Security and Privacy
Verified email at lahr.email