Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Pierre-Yves StrubMaître de Conférence, CS, École PolytechniqueVerified email at strub.nu
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Thomas EspitauPostdoc, NTT CorporationVerified email at lip6.fr
Gaëtan CassiersPostdoc, TU GrazVerified email at uclouvain.be
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Vincent GrossoCNRS/ Université Jean Monnet, Laboratoire Hubert Curien, FranceVerified email at univ-st-etienne.fr
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Pierre-Evariste DagandCNRSVerified email at evr.ist
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Johann HeyszlGoogle | OpenTitanVerified email at google.com