Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance Bounding Protocols on TH-UWB Radios., , , , and . GLOBECOM, page 1-6. IEEE, (2010)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Parallel Generation of l-Sequences., and . Symmetric Cryptography, volume 09031 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2009)A Serious Game for Debating about the Use of Artificial Intelligence during the COVID-19 Pandemic., and . ISCRAM, page 554-563. ISCRAM Digital Library, (2022)DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems., , , , , , and . CoRR, (2020)A New Approach for FCSRs., , , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 433-448. Springer, (2009)Ephemeral: Lightweight pseudonyms for 6LoWPAN MAC addresses., , , and . PIMRC, page 1-6. IEEE, (2016)Entropy harvesting from physical sensors., , and . WISEC, page 149-154. ACM, (2013)Bit matrix multiplication in commodity processors., , and . ASAP, page 7-12. IEEE Computer Society, (2008)From Hardware to Software Synthesis of Linear Feedback Shift Registers.. IPDPS, page 1-8. IEEE, (2007)