Crea il mio profilo
Accesso pubblico
Visualizza tutto26 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Michel AbdallaÉcole Normale SupérieureEmail verificata su ens.fr
- David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaEmail verificata su ens.fr
- Tal RabinUniversity of Pennsylvania, Amazon Web ServicesEmail verificata su seas.upenn.edu
- Alain PasselègueCryptoLabEmail verificata su cryptolab.co.kr
- Damien VergnaudSorbonne UniversitéEmail verificata su lip6.fr
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyEmail verificata su alum.mit.edu
- Olivier BlazyEcole PolytechniqueEmail verificata su polytechnique.edu
- Huijia (Rachel) LinAssociate Professor at the University of WashingtonEmail verificata su cs.washington.edu
- Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Email verificata su ens.fr
- Stephan KrennAIT Austrian Institute of Technology GmbHEmail verificata su ait.ac.at
- Vadim LyubashevskyIBM Research Europe, ZurichEmail verificata su zurich.ibm.com
- Hugo KrawczykAmazon Web ServicesEmail verificata su amazon.com
- Tancrède LepointApplied Scientist, AmazonEmail verificata su amazon.com
- Mariana RaykovaGoogleEmail verificata su cs.columbia.edu
- Benoit LibertZamaEmail verificata su ens-lyon.fr
- Michele OrrùUC BerkeleyEmail verificata su berkeley.edu
- Julian LossCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Emmanuel ProuffSecurity Manager at AppleEmail verificata su apple.com
- Sonia BelaïdCryptoExpertsEmail verificata su cryptoexperts.com
- Eyal KushilevitzComputer Science Department, TechnionEmail verificata su cs.technion.ac.il