Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Kazuo OhtaProfessor, The University of Electro-CommunicationsVerified email at uec.ac.jp
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Yang LINanjing University of Aeronautics and AstronauticsVerified email at uec.ac.jp
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Mitsugu IwamotoThe University of Electro-CommunicationsVerified email at uec.ac.jp
Takeshi SugawaraThe University of Electro-CommunicationsVerified email at uec.ac.jp
Noriyuki MiuraOsaka UniversityVerified email at ist.osaka-u.ac.jp
Naofumi HommaTohoku UniversityVerified email at riec.tohoku.ac.jp
Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Junfeng FanOpen Security ResearchVerified email at opsefy.com
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Kohei MatsudaKobe UniversityVerified email at cs26.scitec.kobe-u.ac.jp
Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityVerified email at georgetown.edu
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Yong Ki LeeSamsung ElectronicsVerified email at snu.ac.kr
Bo-Cheng LaiNational Yang Ming Chiao Tung University, Hsinchu, TaiwanVerified email at nycu.edu.tw
Bazargan Sabet PirouzSorbonne UniversityVerified email at lip6.fr