Get my own profile
Public access
View all42 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mehdi TibouchiDistinguished Researcher, NTT CorporationVerified email at normalesup.org
David PointchevalSenior CNRS Researcher in Computer Science, Ecole Normale Superieure/PSL University, InriaVerified email at ens.fr
Charles BouillaguetLIP6, Sorbonne Université, Paris, FranceVerified email at lip6.fr
Patrick DerbezUniversité Rennes 1Verified email at irisa.fr
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
Thomas EspitauPostdoc, NTT CorporationVerified email at lip6.fr
Benjamin GregoireInria Sophia-AntipolisVerified email at inria.fr
Gaëtan LeurentINRIAVerified email at inria.fr
François DupressoirSenior Lecturer in Cryptography, Department of Computer Science, University of BristolVerified email at bristol.ac.uk
Antoine JouxCISPAVerified email at cispa.saarland
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Pierre-Yves StrubMaître de Conférence, CS, École PolytechniqueVerified email at strub.nu
Raphael BostDirection Générale de l'ArmementVerified email at alumni.brown.edu
Mohamed SabtUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Pierre KARPMANMaître de conférences, Université Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Alexandre TermierUniversity of Rennes 1Verified email at irisa.fr