Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Gilles Van AsscheSTMicroelectronicsVerified email at noekeon.org
- Ruggero SusellaSTMicroelectronicsVerified email at st.com
- Alireza MehrdadPhD Student, Radboud UniversityVerified email at ru.nl
- Filippo MelzaniSecurity PatternVerified email at securitypattern.com
- Diego CarreraSTMicroelectronicsVerified email at st.com
- Pasqualina FragnetoSTMicroelectronicsVerified email at st.com
- Beatrice RossiSTMicroelectronicsVerified email at st.com
- Alessandro BarenghiPolitecnico di MilanoVerified email at polimi.it
- Claudio FerrettiAssociated Professor of Computer Science, Milano-Bicocca UniversityVerified email at disco.unimib.it
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Lorenzo GrassiPostDoc at Ruhr University Bochum - Casa (Germany)Verified email at ruhr-uni-bochum.de
- Gerardo PelosiPolitecnico di MilanoVerified email at polimi.it
- Luca Frittolilastminute.comVerified email at lastminute.com
- Matteo BocchiSr. Advanced Research Engineer on Cryptography, STMicroelectronicsVerified email at st.com
- Luca MagriPolitecnico di MilanoVerified email at polimi.it
- Parisa Amiri EliasiRadboud UniversityVerified email at nyu.edu
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Daniël KuijstersRadboud UniversityVerified email at ru.nl
- Weissbart LéoPhD candidateVerified email at cs.ru.nl
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be