Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Pierre-Yves StrubMaître de Conférence, CS, École PolytechniqueVerified email at strub.nu
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Fabrice BenhamoudaAlgorand FoundationVerified email at normalesup.org
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Thomas EspitauPostdoc, NTT CorporationVerified email at lip6.fr
Gaëtan CassiersPhD Student, UCLouvainVerified email at uclouvain.be
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Vincent GrossoCNRS/ Université Jean Monnet, Laboratoire Hubert Curien, FranceVerified email at univ-st-etienne.fr
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Pierre-Evariste DagandCNRSVerified email at evr.ist
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Johann HeyszlGoogle | OpenTitanVerified email at google.com