Yusuke Naito; Yu Sasaki; Takeshi Sugawara
Mitsubishi Electric Corporation, Kanagawa, Japan; NTT Social Informatics Laboratories, Tokyo, Japan; The University of Electro-Communications, Tokyo, Japan
Denisa O. C. Greconici; Matthias J. Kannwischer; Amber Sprenkels
Digital Security Group, Radboud University, Nijmegen, The Netherlands; Max Planck Institute for Security and Privacy, Bochum, Germany
Annapurna Valiveti; Srinivas Vivek
IIT Bangalore, India
Alejandro Cabrera Aldaya; Billy Bob Brumley
Tampere University, Finland
Antonio Guimarães; Edson Borin; Diego F. Aranha
University of Campinas, Campinas, Brazil; Aarhus University, Denmark
Daniel Escánez-Expósito; Pino Caballero-Gil; Francisco Martín-Fernández
University of La Laguna, Tenerife, Spain; IBM Research, NY, USA
Kashif Nawaz; Eugenio Salazar Brenes; Jeroen Delvaux
Cryptography Research Centre, Technology Innovation Institute, Abu Dhabi, United Arab Emirates
Trevor Yap; Adrien Benamira; Shivam Bhasin; Thomas Peyrin
School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore
Athanasios Moschos; Angelos D. Keromytis
School of Electrical and Computer Engineering, Georgia Institute of Technology, USA
Oleksiy Lisovets; David Knichel; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Aein Rezaei Shahmirzadi; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Olivier Bronchain; Gaëtan Cassiers
UCLouvain, Belgium
Monika Trimoska; Sorina Ionica; Gilles Dequen
University of Picardie Jules Verne, Amiens, France; Radboud University, The Netherlands
Emanuele Strieder; Christoph Frisch; Michael Pehl
Fraunhofer Institute for Applied and Integrated Security, Munich, Germany; Chair of Security in Information Technology, Technical University of Munich, Munich, Germany; TUM School of Computation, Information and Technology, Munich, Germany;
Zane Weissman; Thore Tiemann; Daniel Moghimi; Evan Custodio; Thomas Eisenbarth; Berk Sunar
Worcester Polytechnic Institute Worcester, USA; University of Lübeck, Lübeck, Germany; UC San Diego, San Diego, USA; Amazon Web Services, USA; University of Lübeck, Lübeck, Germany; Worcester Polytechnic Institute, Worcester, USA
Claude Carlet; Sylvain Guilley; Sihem Mesnager
LAGA, Department of Mathematics, University of Paris VIII, Paris, France; University of Bergen, Norway; Secure-IC S.A.S., Paris, France; LTCI, Télécom Paris, Institut Polytechnique de Paris, Palaiseau, France;
Bijan Fadaeinia; Toufiq Hasan Anik; Mohammad Ebrahimabadi; Amir Moradi; Naghmeh Karimi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Maryland Baltimore County, Baltimore, USA
Jannik Zeitschner; Nicolai Müller; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Nicolai Müller; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Marvin Staib; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Rafael Carrera Rodriguez; Florent Bruguier; Pascal Benoit; Emanuele Valea
LIRMM, Université de Montpellier, CNRS, Montpellier, France; University Grenoble Alpes, CEA, Grenoble, France
Daniel Lammers; Nicolai Müller; Amir Moradi
Ruhr University Bochum, Horst Görtz Institute for IT Security, Germany; University of Cologne, Institute for Computer Science, Germany
Shih-Chun You; Markus G. Kuhn; Sumanta Sarkar; Feng Hao
University of Cambridge, UK; University of Warwick, UK
Loïc France; Florent Bruguier; David Novo; Pascal Benoit; Maria Mushtaq
LIRMM, University of Montpellier, CNRS, Montpellier, France; Telecom Paris, Paris, France
Benjamin Hettwer; Sebastien Leger; Daniel Fennes; Stefan Gehrer; Tim Güneysu
Robert Bosch GmbH, Corporate Research, Stuttgart, Germany; Horst Görtz Institute for IT Security, Ruhr University Bochum, Germany; Robert Bosch LLC, Pittsburgh, USA;
Aysajan Abidin; Mohieddine El Soussi; Jac Romme; Pepijn Boer; Dave Singelée; Christian Bachmann
KU Leuven, imec-COSIC, Belgium;
imec, The Netherlands
Sumesh Manjunath Ramesh; Hoda Alkhzaimi
New York University Abu Dhabi, UAE; Tandon School of Engineering, New York University, USA
Jorai Rijsdijk; Lichao Wu; Guilherme Perin; Stjepan Picek
Delft University of Technology, The Netherlands; Radboud University, The Netherlands