Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
Matthieu RivainCryptoExpertsVerified email at cryptoexperts.com
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr
Pierre-Yves StrubMaître de Conférence, CS, École PolytechniqueVerified email at strub.nu
Damien VergnaudSorbonne UniversitéVerified email at lip6.fr
Gaëtan CassiersPostdoc, TU GrazVerified email at uclouvain.be
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
Fabrice BenhamoudaAmazon Web ServicesVerified email at normalesup.org
Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Thomas EspitauPostdoc, NTT CorporationVerified email at lip6.fr
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Vincent GrossoCNRS/ Université Jean Monnet, Laboratoire Hubert Curien, FranceVerified email at univ-st-etienne.fr
Emmanuelle DottaxSecurity Architect, IDEMIAVerified email at idemia.com
Dahmun GoudarziQuarkslabVerified email at quarkslab.com
Pierre-Evariste DagandCNRSVerified email at evr.ist
Jörn-Marc SchmidtInstitute for Applied Information Processing and Communications, Graz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at