Get my own profile
Public access
View all15 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Qian GuoAssistant Professor, Lund UniversityVerified email at eit.lth.se
Martin HellAssociate Professor, Lund UniversityVerified email at eit.lth.se
Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
Tomas Fabsicresearcher, Slovak University of TechnologyVerified email at stuba.sk
Alexander NilssonPhD Researcher in Cryptography, Lund UniversityVerified email at eit.lth.se
Alessandro BudroniCryptography Engineer, Technology Innovation InstituteVerified email at tii.ae
Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se
Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
Anil W. DeyIntel CorporationVerified email at intel.com
johannes svenssonResearcher, Lund UniversityVerified email at eit.lth.se
Mattias BorgLund UniversityVerified email at eit.lth.se
Fredrik KopschResearcher, Royal Institute of TechnologyVerified email at abe.kth.se
Follow